沈晴霓

  • 博士,教授,博士生导师
  • 威廉希尔亚洲公司/威廉希尔/网络软件与系统安全系 副系主任(2016~)

  • Email: qingnishen@ss.pku.edu.cn
  • Tel: 010-61273624
 

是我国自主研发“结构化保护级安胜安全操作系统”的主要完成人之一。长期致力于网络与系统安全领域的教学和科研工作,主持和负责省部级和企业合作项目30多项,包括:国家基金重点/面上、核高基重大、国家863等国家项目;中科院知识创新工程,北京市自然科学基金、深圳市科技攻关等省部项目;华为、IBM、Intel、AWS、八分量等企业合作项目等。在TDSC、Computer J、CCS、AsiaCCS、ACSAC、RAID、ICWS、IPDPS、ICICS、SecureComm、TrustCom、ICC、CLOUD等权威期刊/会议上发表论文90多篇,提出一系列操作系统与虚拟化安全、大数据与云安全、可信计算及区块链安全创新理论、方法和技术,获授权国际/国内发明专利35项(其中已授权美国发明专利1项、欧洲发明专利1项),出版教材和译著5部,参与制定国家标准3项。国内最早开设和主讲“操作系统与虚拟化安全”课程,开放的MOOC课程被评为国家首批“精品在线开放课程”。编著北京市精品教材、威廉希尔亚洲公司优秀教材《操作系统安全设计》与“十一五”国家规划教材《操作系统安全》(第2版),荣获2013年度威廉希尔亚洲公司“杨芙清-王阳元院士优秀教学科研奖”,2016年度获威廉希尔亚洲公司教学优秀奖。

 
  • 1992.9-1994.7

    获中国科学经理春光学精密机械与物理研究所工学硕士学位

  • 2002.9-2006.7

    获中国科学院软件研究所工学博士学位

  • 1994.7-2002.8

    北京理工大学电子工程系教师 先后在计算机应用基础教研室、信息安全与对抗技术实验室从事教研工作

  • 2006.9-

    williamhill中文官网教师 先后担任信息安全系副系主任、软件技术与服务工程学科组副组长

 

 
  1.   《操作系统与虚拟化安全》(国家精品在线开放课程
    全球慕课平台:  https://www.coursera.org/course/os-virtsecurity
    华文慕课平台: http://www.chinesemooc.org/mooc/4391

  2.  《网络空间安全导论》(通识课)

  3. 《大数据与云安全专题》

  4. 《大数据安全与隐私保护》

 

 
  1. 操作系统与虚拟化安全
  2. 大数据与云安全
  3. 可信计算
  4. 区块链安全
 
 

   1.威廉希尔亚洲公司软微-八分量协同创新实验室项目“区块链安全关键技术研究” ,负责人,2018-2020

2.国家自然科学基金面上项目“构建高可信云操作系统的若干关键技术研究” (61672062),负责人,2017-2020

3.国家自然科学基金重点项目“云存储的隐私保护与安全保障机制” (61232005),副组长,2013-2017

4.国家高技术研究发展计划863课题,“云安全的可信服务及示范应用”,副组长,2015-2017

5.AWS合作研发项目“基于AWS的教育云课堂安全与隐私”,负责人,2016-2017

6.深圳科技计划项目“大数据信息安全的关键技术研发”,副组长,2014-2016

7.国家自然科学基金面上项目“面向可信云服务的广义虚拟可信计算平台关键技术研究”(61073156),负责人,2011-2013

8.国家自然科学基金面上项目“以应用安全为核心的可信虚拟监控器安全机制研究” (60873238),负责人,2009-2011

9.国家自然科学基金面上项目“可信操作系统的基本理论与关键技术研究” (60970135),参与,2010-2012

10.国家自然科学基金面上项目“高安全等级安全操作系统关键技术研究”(60573042),参与,2006-2008

11.“核高基”国家重大专项 “面向新型网络应用模式的网络化操作系统”(2009ZX01039-001-001),参与,2009-2010

12.“核高基”国家重大专项“国产操作系统参考实现”,参与,2009-2011

13.国家十一五预研项目,子课题负责人,2006-2009.

14.国家科技支撑计划重大项目 (2008BAH33B02)子课题“安胜安全操作系统应用”,副组长,2008-2010

15.IBM SUR共享大学研究项目“Security Services of Private Storage Cloud” 负责人之一,2009-2011

16.Intel UPO大学项目“Virtualization Security Curriculum”, 负责人,2012-2013

17.华为合作研究项目“众核OS管理系统”负责人,2012-2013

18.2009华为高校科技基金项目“电信网络环境下云计算服务平台安全体系”,负责人,2009-2010

19.2008华为高校科技基金项目“广义可信虚拟计算平台安全体系结构研究”,负责人,2008-2009

20.华为委托合作项目“可信计算平台TPM在某系统中的应用”,负责人,2008-2009

21.北京市自然科学基金项目“高安全等级操作系统若干前沿问题研究” (4052016),参与,2006-2008

22.全国信息安全标准化技术委员会专项“基于可信计算平台的安全操作系统及相关标准研究”参与,2006

23.全国信息安全标准化技术委员会专项“高安全等级操作系统关键安全技术与规范”参与,2006

24.全国信息安全标准化技术委员会专项“可信计算跟踪研究”参与人,2005

25.中国科学院软件研究所预先研究项目“最高等级安全操作系统形式化方法研究”参与,2004-2006

    26.中国科学院知识创新工程方向性项目“结构化保护级安全操作系统设计”参与,2002-2005  

 
 
 
  1.  Pengfei Wu, Robert Deng, Qingni Shen*, Ximen Liu, Qi Li, Zhonghai Wu*. ObliComm: Towards Building an Efficient Oblivious Communication System [J], IEEE Transactions on Dependable and Secure Computing (TDSC), 2021, 18(5): 2331-2348.
  2. Cong Li, Qingni Shen*, Zhikang Xie, Xinyu Feng, Yuejian Fang, Zhonghai Wu. Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model[J], The Computer Journal, Volume 64, Issue 4, April 2021, Pages 509–533, https://doi.org/10.1093/comjnl/bxaa075..

  3. Cong Li, Yuejian Fang*, Xing Zhang, Cancan Jin, Qingni Shen, Zhonghai Wu. A Practical Construction for Large Universe Hierarchical Attribute-Based Encryption[J], Concurrency and Computation: Practice and Experience (CCPE) , DOI 10.1002/cpe.3957, pp:1-10, 2016

  4. Qingni Shen,Yahui Yang, Zhonghai Wu, etc. Securing Data Services: A Security Architecture Design of Private Storage Cloud Based on HDFS[J], International Journal of Grid and Utility Computing , 4(4):242-254, 2013

  5. Anbang Ruan, Qingni Shen*, Li Wang, etc. Towards a Source-Code Oriented Attestation[J]. China Communications, 6(4): 82-87, 2009.

  6. 董春涛,沈晴霓*,罗武,吴鹏飞,吴中海,SGX应用支持技术研究进展[J],软件学报, 2021,32(1):137-166.

  7. 罗武,沈晴霓*,吴中海*,吴鹏飞,董春涛,夏玉堂,浏览器同源策略安全研究综述[J], 软件学报,2021,32(8):2469-2504

  8. 罗杨,沈晴霓,吴中海. 一种基于元模型的访问控制策略描述语言[J], 软件学报,2020,31(2):439-454 

  9. 吴鹏飞,沈晴霓,秦嘉,钱文君,李聪,吴中海. 不经意随机访问机研究综述[J],软件学报,. 2018,29(9):2753-2777

  10. 罗杨,沈晴霓,吴中海. 一种新的访问控制策略描述语言及其权限划分方法[J]. 计算机学报, 2017.11,40(152).

  11. 张星, 文子龙, 沈晴霓, 方跃坚, 吴中海. 可追责并解决密钥托管问题的属性基加密方案[J]. 计算机研究与发展, 2015, 52(10): 2293-2303.

  12. 沈晴霓,卿斯汉,吴中海,张力哲,杨雅辉. 基于动态域划分的安全冗余调度策略[J],通信学报,2014,35(1): 34-46, 2014

  13. 方跃坚,沈晴霓,吴中海,一种超椭圆曲线密码处理器并行结构设计[J],计算机研究与发展,2013,50(11):2383-2388。

  14. 沈晴霓, 杜虹,文汉, 卿斯汉. 一种基于完整性度量架构的数据封装方法[J]. 计算机研究与发展. 2012, 49(1):210-216.

  15. 卿斯汉, 李丽萍, 何建波, 沈晴霓. 基于DTE策略的安全域隔离Z形式模型[J]. 计算机研究与发展, 2007, 44(11): 1881-1888

  16. 沈晴霓, 卿斯汉, 贺也平,李丽萍 一种支持动态调节的最小特权安全策略架构[J], 电子学报 ,2006, 34(10): 61~66.

  17. 沈晴霓, 卿斯汉, 李丽萍, 一种多层次的特权控制机制的设计与实现[J], 计算机研究与发展 , 2006, 43 (3): 423~428

  18. 沈晴霓, 卿斯汉, 贺也平, 沈建军, 多策略适应的一种POSIX权能遗传算法[J], 通信学报, 2006, 27(2): 66~72 

  19. 李丽萍, 卿斯汉, 贺也平, 沈晴霓, 基于访问控制空间的多策略安全体系结构[J], 通信学报, 2006, 27(2):107~112 

  20. 郭畅,沈晴霓,吴中海. 一种防止数据泄露的云存储优化模型[J],电子科技大学学报, 2016, 45(1): 118-122.

  21. 罗杨, 张齐勋, 沈晴霓, 刘宏志, 吴中海. 多层次的Android系统权限控制方法[J]. 软件学报, 2015, 26(Suppl.(2)): 263-271.

  22. 沈晴霓, 李卿. 云计算环境中的虚拟机同驻安全问题综述[J]. 集成技术, 2015 (5): 5-17.

  23. 沈晴霓,边缘云计算安全相关技术研究进展[J],自动化博览,2021,第8期,36-42

  
 

 

<Big data and Cloud Security & Privacy>

  1. 1.  Xiaoyi Chen, Ahmed Salem, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang, BadNL: Backdoor Attacks against NLP models with Semantic-preserving Improvements, the 2021 Annual Computer Security Applications Conference (ACSAC 2021)(to appear)。
  2. Zhikang Xie, Qingni Shen*, Cong Li, Jisheng Dong, Yuejian Fang: Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet. The 57th IEEE International Conference on Communications ICC 2021): 1-6, Montreal, QC, Canada, June 14-23, 2021。
  3. Pengfei Wu, Qingni Shen*, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu*: ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. The 14th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2019) : 86-99, Auckland, New Zealand, July 09-12
  4. Mengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen, PTAD: Provable and Traceable Assured Deletion in Cloud Storage. IEEE Symposium on Computers and communications (ISCC2019). Barcelona, Spain. June 2019.
  5.  Lijing Cheng, Qingni Shen*, Chuntao Dong: Invader Job: A Kind of Malicious Failure Job on Hadoop YARN. The 54th IEEE International Conference on Communications (ICC 2018) , 20-24 May 2018 // Kansas City, MO, USA
  6. Tong Hui, Yahui Yang, Qingni Shen, Zhonghai Wu: Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework. The 54th IEEE International Conference on Communications (ICC 2018) , 20-24 May 2018 // Kansas City, MO, USA
  7.  Yazhen Tian, Qingni Shen*, Ziyao Zhu, Yahui Yang, Zhonghai Wu: Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming. IEEE Symposium on Computers and communications (ISCC 2018): 783-786, 25-28 June, 2018, Natal, Brazil
  8. Yizhe Yang, Qingni Shen*, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu: Memory Cache Attacks on Alluxio Impede High Performance Computing. 16th IEEE International Symposium on Parallel and Distributed Processing with ApplicationsISPA 2018: 407-414, Melbourne, Australia, December 11-13, 2018.
  9.  Yang Luo, Tian Puyang, Xiaoning Sun, Qingni Shen, Yahui Yang, Anbang Ruan, Zhonghai Wu*. RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful API. The 24rd International Conference on Web Services (ICWS 2017), June 25 - June 30, 2017, Honolulu, Hawaii, USA.
  10.   Tian Puyang, Qingni Shen*, Yang Luo, Wu Luo, Zhonghai Wu. Making Least Privilege the Low-Hanging Fruit in Clouds, 53th IEEE International Conference on Communications (ICC 2017), Paris, France, 21-25 May, 2017. 
  11. Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen*, Zhonghai Wu. Practical Large Universe Attribute-Set Based Encryption in the Standard Modelthe 19th International Conference on Information and Communications Security(ICICS 2017), December 6-8, 2017, Beijing, China.
  12. Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen*. Fully Secure Hidden Ciphertext-Policy Attribute-based Proxy Re-encryption, the 19th International Conference on Information and Communications Security(ICICS 2017), December 6-8, 2017, Beijing, China.
  13.  Wenjun Qian, Qingni Shen*, Yizhe Yang, Yahui Yang, Zhonghai Wu. Statically Defend Network Consumption against Acker Failure Vulnerability in Storm, the 19th International Conference on Information and Communications Security (ICICS 2017), December 6-8, 2017, Beijing, China.
  14. Ziyao Zhu, Qingni Shen*, Yahui Yang, Zhonghai Wu. MCS: Memory Constraint Strategy for Unified Memory Manager in Spark, The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2017), 15-17 December 2017, Shenzhen, China.
  15. Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu*. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle, 9th EAI International Conference on Digital Forensics & Cyber Crime(ICDF2C2017)October 9-11 2017, Prague, Czech Republic, pp: 221-227
  16. Yang Luo, Hongbo Zhou, Qingni Shen, Anbang Ruany, Zhonghai Wu*. RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs, The 23rd International Conference on Web Services (ICWS 2016), June 27 - July 2, 2016, San Francisco, USA.
  17. Yang Luo, Wu Luo, Tian Puyang, Qingni Shen, Anbang Ruan, Zhonghai Wu: OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud. 9th IEEE International Conference on Cloud Computing (CLOUD 2016): 51-58, San Francisco, CA, USA, June 27 - July 2, 2016.
  18.  Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu*. MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud, the 18th International Conference on Information and Communications Security (ICICS 2016):214-226, Singapore, Singapore, Nov. 29–Dec. 2, 2016.
  19. Chuntao Dong, Qingni Shen*, Lijin Cheng, Yahui Yang, Zhonghai Wu. SECapacity: A Secure Capacity Scheduler in YARN, the 18th International Conference on Information and Communications Security (ICICS 2016) :184-194, Singapore, Singapore, Nov. 29–Dec. 2, 2016.
  20.  Wenjun Qian, Qingni Shen*, Jia Qin, Dong Yang, Yahui Yang, Zhonghai Wu. S-Storm: A Slot-aware Scheduling Strategy for Even Scheduler in Storm, The 18th IEEE International Conference on High Performance Computing and Communications(HPCC 2016), Sydney, Australia, December 12 - 14, 2016. IEEE, pp.623-630, 2016.
  21. Jin Cancan, Feng Xinyu, Shen Qingni. Fully secure hidden ciphertext policy attribute-Based Encryption with short ciphertext size, The 6th International Conference on Communication and Network Security (ICCNS 2016), Singapore, 2016.
  22.  Wenting Li, Qingni Shen*, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016) , Feb 19-21, 2016, Roman, Italy. 2016: 146-156.
  23.  Zhang X, Jin C, Li C, Wen Z, Shen Q, Fang Y, Wu Z. Ciphertext-policy attribute-based encryption with user and authority accountability, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15) :500-518, Oct 26-29, 2015, Dallas, USA.
  24. Fang Y, Wen Z, Shen Q, et al. POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15): 585-589, Oct 26-29, 2015, Dallas, USA.
  25.  Chang Guo, Qingni Shen, Zhonghai Wu. UserRank: A User Influence-based Data Distribution Optimization Method, Chang Guo, 39th Annual International Computers, Software & Applications Conference Workshops(COMPSAC 2015) , pp.104-109, July 1-5, 2015, Tai chung, Tai wan.
  26. Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. MB-DDIVR: A Map-based Dynamic Data Integrity Verification and Recovery scheme in Cloud Storage. The 17th International Conference on Information and Communications Security (ICICS 2015): 312-318, Dec 9-11, Beijing, China
  27.  Zhang Xing, Jin Cancan, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai. Attribute-based encryption without key escrow. International Conference on Cloud Computing and Security (ICCCS’15): 74-87.
  28.  Chuntao Dong, Qingni Shen*, Wenting Li, Yahui Yang, Zhonghai Wu. Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. The Seventeenth International Conference on Information and Communications Security (ICICS 2015): 429-435, Dec 9-11, Beijing, China
  29.  Ying Chen, Qingni Shen*,Pengfei Sun,Yangwei Li, Sihan Qing etc. Reliable Migration Module in Trusted Cloud based on Security Label-Design and Implementation. In Proc. of the 26th IEEE International Parallel & Distributed Processing Symposium Workshops (IEEE IPDPS 2012). May 21-25, 2012, Shanghai, China.
  30. Qingni Shen,Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenmin Lao,Dandan Wang, Min Long. SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2012),Fukuoka, Japan, March 26-29, 2012
  31.  Pengfei Sun, Qingni Shen*,Ying Chen,Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu. POSTER: LBMS: Load Balancingbased on Multilateral Security in the Cloud. In Proc. of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011):861-864, October 17–21, 2011, Chicago, Illinois, USA.
  32. Xin Yang, Qingni Shen*, Yahui Yang, Sihan Qing. A Way of Key Management in Cloud Storage Based on Trusted Computing. In Proc. of the 8th IFIP International Conference on Network and Parallel Computing (IFIP NPC2011): 135-145, Changsha, China. 2011.10
  33. Qingni Shen, Xin Yang, Xi Yu, Yahui Yang, Zhonghai Wu. Towards Data Isolation and Collaboration in Storage Cloud. In Proc. of the 2011 IEEE Asia-Pacific Services Computing Conference (APSCC2011): 139-146. December 12-15, 2011,Jeju, Korea.
  34.   Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang. SecDM:Securing Data Migration Between Cloud Storage Systems. In Proc. of 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing (CDAS2011): 636-641. December 12-14, Sydney, Australia.
  35. Song Luo, Qingni Shen*, Yongmei Jin,Zhong Chen. A Variant of Boyen-Waters Anonymous IBE Scheme. In Proc. of 13th International Conference on Information and Communication Security (ICICS2011): 42-56. Beijing, China, Nov.24-26, 2011. 
  36. Song Luo, Qingni Shen*,Zhong Chen,Fully Secure Unidirectional Identity-Based Proxy Re-encryption. In Proc. of the 14th International Conference on Information Security and Cryptology (ICISC 2011), Nov 30-Dec 2, 2011, Seoul, Korea.
  37.  Cong Tang, Yonggang Wang,Hu Xiong, Tao Yang, Jianbin Hu, Qingni Shen, etc, Need For Symmetry: Addressing Privacy Risks in Online Social Networks, In Proc. of the 25th International Conference on Advanced Information Networking and Applications (AINA 2011), Biopolis, Singapore, March 22-25,2011

 

<Operating System & Virtualization Security>

  1. Xuhao Wang, Qingni Shen*, Wu Luo, Pengfei Wu. RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis, 13rd IEEE International Conference on Cloud Computing (CLOUD2020),pp:600-608Beijing, China,18-24 October, 2020。
  2. Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi: KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. The 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018): 691-710. 10-12 September 2018 - Heraklion, Crete, Greece
  3. Yuchen Wong, Qingni Shen*: Secure Virtual Machine Placement and Load Balancing Algorithms with High Efficiency. 16th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA 2018): 613-620, Melbourne, Australia, December 11-13, 2018.
  4. Yuqing Qiu, Qingni Shen*, Yang Luo, Cong Li, Zhonghai Wu. A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud, The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Sydney, Australia, 1-4 August, 2017.  
  5. Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu*. Whispers Between the Containers: High-capacity Covert Channel Attacks in Docker, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016. 
  6. Qian Sun, Qingni Shen*, Cong Li, Zhonghai Wu. SeLance: Secure Load Balancing of Virtual Machines in Cloud, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  7. Cong Li, Qingni Shen*, Kang Chen, Yahui Yang, Zhonghai Wu. Whisper in the Cloud:A Covert Channel Using the Result of Creating a Virtual Machine. 2016 International Conference on Information Systems Security and Privacy (ICISSP 2016) , Feb 19-21, 2016, Roma Italy. 2016: 380-387.
  8.  Kang Chen, Qingni Shen*, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu. Sift: An Efficient Method for Co-residency Detection on Amazon EC2. 2016 International Conference on Information Systems Security and Privacy (ICISSP 2016) , Feb 19-21, 2016, Roma Italy. 2016: 423-431.
  9.  Chen Y, Li Q, Yu M, Ding X and Shen Q. SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15): 193-211, Oct 26-29, 2015, Dallas, USA.
  10. Yang Luo, Qingni Shen, Cong Li, Kang Chen, Zhonghai Wu. Probing the Scheduling Algorithms in the Cloud Based on OpenStack. 2015 International Conference on Cloud Computing and Security (ICCCS 2015): 510-520.
  11.  Qingni Shen, Mian Wan,Zhuangzhuang Zhang, Sihan Qing, Zhonghai Wu. A Covert Channel Using Event Channel State on Xen Hypervisor. 15th International Conference on Information and Communication Security (ICICS 2013). Beijing, China, Nov 20-22, pp:125-134, 2013(EI)
  12. $112.   Yangwei Li, Qingni Shen*,Pengfei Sun,Cong Zhang, Ying Chen. A Covert Channel Using Core Alternation In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2012), Fukuoka, Japan, March 26-29, 2012
  13.  Ennan Zhai, Qingni Shen*, Yonggang Wang, Tao Yang, Liping Ding, Sihan Qing. SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. In Proc. of the 13th Asia-Pacific Web Conference (APWeb 2011). pp:370-375, Beijing, China,April 18-20, 2011.(EI) 
  14.  Sihan Qing, Qingni Shen, Qingguang Ji, Yeping He, A Dynamically Modified Privilege Control Policy, In Proc. of the 7th IEEE Annual Information Assurance Workshop (IAW2006), pp: 340-347, USMA, West Point, NY, USA, June 21-23, 2006.
  15.  Jianjun Shen, Sihan Qing, Qingni Shen, Design of a Micro-kernel Based Secure System Architecture, In Proc. of 7th IEEE Annual Information Assurance Workshop (IAW2006), pp: 384- 385, USMA, West Point, NY, USA, June 21-23, 2006.
  16. Jianjun Shen, Sihan Qing, Qingni Shen,Liping Li: Covert Channel Identification Founded on Information Flow Analysis. In Proc. of the 2005 International Conference on Computational Intelligence and Security(CIS'2005): 381-387.
  17. Jianjun Shen, Sihan Qing, Qingni Shen,Liping Li: Optimization of Covert Channel Identification. In Proc. of the IEEE Security in Storage Workshop 2005(SISW2005): 95-108.

<Trusted Computing>

1.         Wu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers. The 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), September 23-25, 2019, Beijing, China(to appear)

2.         Wu Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu: TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing. ICWS 2018: 67-83

3.         Wu Luo, Wei Liu, Anbang Ruan, Qingni Shen, Zhonghai Wu*. Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016.

4.         Liang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong Mei. SCOBA: Source Code Based Attestation on Custom Software. In Proc. of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pp: 337-346. Austin, Texas, December 6–10, 2010 (EI: 20110413614189)  

5.         Liang Gu, Anbang Ruan, Yao Guo, Qingni Shen, Xiangqun Chen. Practical Property-based Attestation on Free Software, in Proc. of the 25th Annual Computer Security Applications Conference (ACSAC 2009), HawaiiUSA, 7-11 December, 2009 (poster)

6.         Anbang Ruan, Qingni Shen*, Liang Gu, Li Wang, Lei Shi, YahuiYang, ZhongChen. Trusted Isolation Environment: An Attestation Architecture with Usage Control model. In Proc. of 11th International Conference on Information and Communication Security (ICICS 2009). pp: 226-240. Beijing, China, Dec.14-17, 2009.

 7.       Anbang Ruan, Qingni Shen*, Yuanyou Yin. A Generalized Trusted Virtualized Platform Architecture. In Proc. of the Young Computer Sciencists, 2008 (ICYCS2008): 2340-2346Zhangjiajie, China, Nov.18-21, 2008. 

 
 

1.       Qingni Shen, Lanfang Ren,Shaobin Wang, Yuanyou Jin, et al. Method, Apparatus And System for Virtual Machine Migration Decision. European Patent No: EP2352088, Sep.7, 2016.

2.       Qingni Shen, Lanfang Ren,Shaobin Wang, Yuanyou Jin, etc. Method, Apparatus and System for Making a Decision about Virtual Machine Migration. United States Patent No: US8413147B2,Apr. 2, 2013

3.       沈晴霓,钱文君,杨雅辉,吴中海等。一种工作槽感知的Storm平台作业均分调度方法,授权专利号:ZL20161040461982019.7.4

4.       沈晴霓,孙茜李聪,吴中海等。一种云环境中虚拟机负载均衡安全调度方法,授权号:ZL201610407666.8, 2019.7.2

5.       沈晴霓,董春涛,杨雅辉,吴中海等。一种面向大数据平台的基于用户分级的安全调度方法,授权专利号:ZL201610373850.52019.5.21

6.       沈晴霓,李聪,杨雅辉,吴中海等。一种云环境下抗同驻的虚拟机部署方法, 授权专利号:ZL201610371375.8, 2019.3.22

7.       沈晴霓,张智,陈康等。一种云环境下基于隐蔽通道的虚拟机同驻检测方法,授权号:ZL201410218538X, 2018.4.10

8.       沈晴霓,韩笑,方跃坚,吴中海。一种适用于移动端位置隐私保护的空间匿名化方法, 授权专利号:ZL2014102677666, 2018.1.5

9.       沈晴霓,李文婷,杨雅辉,吴中海等。一种面向大数据平台的拒绝服务检测方法,授权专利号:ZL201610075208.92018.11.13

10.   沈晴霓,李才,郭明宇等。线程创建方法、业务请求处理方法及相关设备, 授权专利号:ZL201310733930.32018.6.15

11.   沈晴霓,万冕, 卿斯汉等,一种适用于移动云的客户端动态认证方法,中国,专利号:ZL201310227082.9, 2016-02-10

12.   沈晴霓,李扬威,卿斯汉等,基于多核处理器的通信方法及其检测方法和控制方法,中国,专利号:ZL201110220307.9, 2015-12-09

13.   沈晴霓,杨雅辉,禹熹,张力哲等,适用于存储云内的数据隔离方法. 中国,专利号:ZL201110175541.4, 2015-02-25

14.   沈晴霓,杨雅辉,杨欣等,一种基于可信计算的密钥生成、备份和迁移方法及系统,中国,专利号:ZL201110205512.8, 2014-11-05

15.   杨雅辉,黄海珍,沈晴霓,吴中海。基于增量式GHSOM 神经网络模型的入侵检测方法,中国,ZL 201210206778.9, 2014.11

16.   沈晴霓, 张力哲,杨雅辉,吴中海. 一种基于MapReduce机制的任务调度方法和系统. 国家知识产权局发明专利. 专利授权号:ZL CN2012102280313, 201485 

17.   杨雅辉,阳时来,沈晴霓,黄海珍。一种基于半监督神经网络模型的网络入侵检测方法,中国,ZL 201210074813.6, 2014.7

18.   沈晴霓 孙鹏飞 李扬威 魏何. 一种解决虚拟化平台多边冲突的方法及系统. . 国家知识产权局发明专利. 专利授权号:ZL CN201110228801.X, 2014416 

19.   沈晴霓, 任兰芳 王绍斌 靳远游 魏磊 李钊 阮安邦 石磊. 一种虚拟机迁移决策方法、装置及系统. 国家知识产权局发明专利. 专利授权号:ZL CN 200910108609.X, 2013116 

20.   杨雅辉 沈晴霓 张力哲 禹熹 吴尉泷 王丹丹 龙敏, 适用于存储云间数据安全迁移的方法, . 国家知识产权局发明专利. 专利授权号:ZL CN201110101646.5, 2013114 

21.   沈晴霓, 杨雅辉,劳振明, 禹熹, 吴尉泷, 王丹丹, 龙敏, 适用于存储云内数据安全迁移的方法. 国家知识产权局发明专利. 专利授权号:ZL CN201110144862.8, 2013626 

22.   沈晴霓, 阮安邦,靳远游,魏磊,王绍斌. 一种虚拟机的管理方法、装置和系统. 国家知识产权局发明专利. 专利授权号:ZL CN200810180626.X, 2013612 

23.   杨雅辉,姜电波,沈晴霓,夏敏,张英,何家胜,一种基于生长型分级自组织映射神经网络的入侵检测方法. 国家知识产权局发明专利. 专利授权号:ZL CN201010228750.6, 2012118

24.   卿斯汉,沈晴霓, 李丽萍, 唐柳英, 季庆光. 一种安全操作系统中实现最小特权控制的策略和方法. 国家知识产权局发明专利. 专利授权号:ZL , CN100401223, 200879 

 

 
  1. 沈晴霓,卿斯汉,操作系统安全设计,机械工业出版社(华章分社)(北京市精品教材).2013.9
  2. 卿斯汉,沈晴霓,操作系统安全(第2版)(国家十一五规划教材),清华大学出版社. 2011.6
 

1.       IEEE会员、ACM会员、中国计算机学会高级会员 

2.       中国计算机学会计算机安全专委会委员 

3.       国家自然科学基金委同行评议专家 

4.       《信息安全实用全书》编委 

5.      现兼任边缘计算产业联盟安全工作组主席,曾担任ICICS 2019(http://icics.cn)大会主席,ICICS 2021、2020、2017宣传委员会主席,ICICS 2013组织委员会主席,多次担任ICICS , TrustCom, ACNS, STM等国际学术会议程序委员会成员等。

6.        学术期刊和会议审稿:计算机学报,通信学报,计算机研究与发展,电子与信息学报(中英文)等,以及 Computer & Security, JPDC, ICICS, Trust, IFIP/SEC, ATC, TrustCom等。