学术 研究 | 近五年来承担的学术研究课题 《公钥环境下零知识组合性研究》,国家自然科学基金,2008.1~2010.12,第三 《研创基于复杂性理论的可证明安全性新框架》,973子课题,2007.5~2012.5,第三 《上海临港新城应用集成平台》,上海市科委重点项目,2004.7~2006.7,参与 教材 韩伟力,臧斌宇,朱东来,高珺。《应用系统开发导论》(主编),国家教育部十一五规划教材,清华大学出版社出版,2008年2月 国内外主要刊物上发表的学术论文 1. Ye Cao, Weili Han*, Yueran Le. Anti-phishing Based on Automated Individual White-List, the 4th ACM Workshop on Digital Identity Management, Collocated with ACM CCS2008, 2008, Fairfax, VA, USA: 51-60. (Corresponding Author) 2. Weili Han, Xingdong Shi, Ronghua Chen. Process-Context Aware Matchmaking for Web Service Composition, Journal of Network and Computer Applications, 2008, Vol. 31(4): 559–576. 3. Weili Han, Yi Wang, Ye Cao, Jipin Zhou, Lixing Wang. Anti-Phishing by Smart Mobile Device, IFIP International Conference on Network and Parallel Computing, 2007, Dalian, China: 295-300. 4. Ting Chen, Weili Han, Haidong Wang, Yixun Zhou, Bin Xu, Binyu Zang. Content Recommendation System Based on Private Dynamic User Profile, International Conference of Machine Learning and Cybernetics (ICMLC) 2007, Hongkong, China: 2112-2118. 5. Xingdong Shi, Weili Han*, Yinsheng Li, Ying Huang. Integrated Business-Process-Driven Design for Service-Oriented Enterprise Applications, International Journal of Pervasive Computing and Communications, 2007, 3(2): 175-189. (Corresponding Author) 6. Xingdong Shi, Weili Han, Yinsheng Li, Ying Huang. Service-oriented Business Solution Development Driven by Process Model. The 5th International Conference on Computer and Information Technology (CIT 2005), Shanghai, China: 1086-1092. 7. Han Weili, Zhang Junjing, Yao Xiaobo. Context-Sensitive Access Control Model and Implementation. The 5th International Conference on Computer and Information Technology (CIT 2005), Shanghai, China: 757-763. 8. Han Weili, Shi Xingdong, Li Yinsheng. Constraint Access Control for Direct Authorization. The 9th International Conference on CSCW in Design (CSCWD 2005), Convertry, UK, 2005, 69-73. 9. Han Weili, Zhu Donglai. Access Control Service for Enterprise Applications. 10th Joint International Conference of Computer, Kunming, China, 2004: 352-359. |