伟德BETVLCTOR体育
设为首页 | 加入收藏
首页公司概况团队建设学术科研团队力量人才培养教学教务党群工作员工工作人才招聘新疆数学会重点实验室员工园地
当前位置: 首页 > 团队力量 > 教授 > 正文
努尔买买提·黑力力
2024-03-13 16:19  

教授

  • E-mail: nur924 at sina dot com

  • 主页: http:/info/1018/1506.htm

  • 办公室: 伟德BETVlCTOR1946博达校区数学楼327室

个人简历 

努尔买买提·黑力力, 男, 新疆库车人, 博士, 教授, 博士研究生导师, 新疆数学学会副理事长,中国密码学会会员. 2008年7月在北京大学数学科学学院获得理学博士学位. 2010.4-2011.4,在韩国中央大学从事博士后研究. 2016.4-2017.4, 在美国明尼苏达大学双城分校做访问学者. 主要研究方向: 信息安全与密码学, 访问控制, 云存储安全.
到目前主持国家自然科学基金项目3项; 主持自治区自然科学基金项目2项, 自治区教育厅高校科研计划重点项目1项, 自治区人力资源和社会保障厅留学人员科技活动项目1项;指导国家级老员工创新创业训练计划项目1项, 自治区级1项; 发表论文40余篇, 获得软件著作权6项; 指导博士研究生2名, 硕士研究生23名.

教育经历

  • 北京大学 数学科学学院 (2004.9-2008.7) 理学博士

    专业:应用数学; 研究方向:人工智能与智能软件

  • 北京大学 数学科学学院 (2000.9-2003.7)工学硕士

    专业:信息科学; 研究方向:信号与信息处理

  • 北京大学 数学科学学院 信息科学系 (1996.9-2000.7)理学学士

工作经历

  • 教授

    2017.12 - 至今

    伟德BETVlCTOR1946 伟德BETVLCTOR体育 信息与计算科学系.

  • 访问学者

    2016.4 - 2017.4

    美国明尼苏达大学双城分校 计算机科学与工程系 智能存储研究中心(CRIS); 主要研究:云存储安全.

  • 副教授

    2011.10 - 2017.12

    伟德BETVlCTOR1946 伟德BETVLCTOR体育 计算数学教研室.

  • 博士后

    2010.4 - 2011.4

    韩国中央大学 计算机科学与工程学院 电子商务与网络应用实验室; 主要研究:社交网络,信任管理.

教学经历

  • 大数据安全

  • 离散数学

  • 信息论基础

  • 密码学

  • 信息安全

  • 人工智能

  • 高等数学

  • 线性代数

  • 概率论与数理统计

  • Web程序设计

  • 计算机应用技术

  • 数据结构

  • 操作系统原理

主持的科研项目

  • 基于密码的外包数据访问控制中的防信息推理研究

       国家自然科学基金项目 2019.1-2022.12

  • 面向相似用户簇与敏感权限集的访问控制及其系统实现

    国家自然科学基金项目 2016.1-2019.12

  • 基于信任和风险的访问控制博弈模型研究

    国家自然科学基金项目 2013.1-2016.12

  • 信任和风险自适应访问控制模型研究

    新疆维吾尔自治区高校科研计划项目(重点项目) 2013.1-2015.12

  • 基于角色的访问控制模型的扩展及其基于本体的表示和实现

    新疆维吾尔自治区自然科学基金青年基金项目 2009.6-2011.12

  • 参数化RBAC 模型在校园门户中的应用

    伟德BETVlCTOR1946自然科学基金项目 2010.1-2011.12

发表论文(部分)

  • Shan Quan, Yongdan Zhao and Nurmamat Helil, "Attribute-Based Access Control Policy Generation Approach from Access Logs Based on CatBoost," Computing and Informatics, Vol. 42 No. 3 (2023), pp.615-650, 2023 .(SCI)

  • Yinlong Wang, Ting Guo and Nurmamat Helil, "CP-ABE Optimization via the Flexible Integration of Access Policies Containing Multiple Shared Subpolicies," Security and Communication Networks, 2023, 2023, 1-21. (EI)

  • Yan An and Nurmamat Helil, "Authorization Recycling in Attribute-Based Access Control," Wireless Communications and Mobile Computing, 2023, 2023, 1-20.(EI)

  • Gulmire Arkin and Nurmamat Helil, "Ciphertext-Policy Attribute Based Encryption with Selectively-Hidden Access Policy," Computing and Informatics, vol. 40(2021), pp. 1001–1024, 2021. (SCI)

  •  Jiajie Du and Nurmamat Helil, “Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption,” KSII Transactions on Internet and Information Systems, vol. 15, no. 9, pp. 3274-3297, 2021. (SCI)

  •  韩舒艳, 努尔买买提·黑力力, “选择性隐藏树型访问结构的CP-ABE方案," 计算机工程, vol. 46(7), pp. 150-158, 2020.

  • Mucheol Kim, Ka Lok Man, and Nurmamat Helil, “Advanced Internet of Things and Big Data Technology for Smart Human-Care Services,” Journal of Sensors, vol. 2019, pp. 3, 2019.(SCI)

  • 迪力夏提·吾普尔, 陈成, 努尔买买提·黑力力, "隐藏策略的可验证外包解密OO-CP-ABE访问控制方案," 计算机工程, vol. 45(10): pp. 166-170, 2019.

  • 陈成,努尔买买提·黑力力、“基于CP-ABE的利益冲突数据集的访问控制,”.计算机科学,vol. 45(11), pp. 149-154, 2018.

  • Nurmamat Helil and Kaysar Rahman, “CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy,” Security and Communication Networks, vol. 2017(2017), pp. 1–13, 2017 (SCI).

  • Nurmamat Helil, Azhar Halik and Kaysar Rahman, “Non-zero-sum cooperative access control game model with user trust and permission risk,” Applied Mathematics and Computation, vol. 307(2017), pp. 299–310, 2017 (SCI, EI).

  • Nurmamat Helil and Kaysar Rahman, “Secret Sharing Scheme Based Approach for Access Control Constraint Against Similar Users’ Collusive Attack,” Journal of Information Science and Engineering, vol. 32(6), pp. 1455–1470, 2016 (SCI, EI).

  • Nurmamat Helil and Kaysar Rahman, “Attribute based access control constraint based on subject similarity,” in 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), Ottawa, ON, Canada, pp. 226 – 229, 2014 (EI).

  • Nurmamat Helil, Mucheol Kim and Sangyong Han, “Trust and Risk based Access control and Access Control Constraints,” KSII Transactions on Internet and Information Systems, vol. 5(11), pp. 2254-2271, 2011 (SCI).

  • Nurmamat Helil and Sangyong Han, “Semantic Based RBAC with Negative Authorization and Permission Hierarchy,” International Journal of Engineering Intelligent Systems, vol. 19(3), pp. 149-157, 2011 (EI).

  • Nurmamat Helil and Kaysar Rahman, “Extending XACML Profile for RBAC with Semantic Concepts,” In International Conference on Computer Application and System Modeling, ICCASM 2010, Taiyuan, China, vol. 10, pp. v1069-v1074, 2010 (EI).

  • Nurmamat Helil and Kaysar Rahman, “RBAC Constraints Specification and Enforcement in Extended XACML,” In The International Conference on Multimedia Information Networking and Security, MINES 2010, Nanjing, China, pp. 546-550, 2010 (EI).

  • 努尔买买提•黑力力,开依沙尔•热合曼,艾孜海尔•哈力克, “灵活的混合RBAC模型及冲突解决,” 计算机工程与应用, vol. 46(36), pp. 101-104, 2010.

  • 努尔买买提•黑力力,开依沙尔•热合曼,“带负授权RBAC模型的OWL表示及冲突检测,” 计算机工程与应用, vol. 46(30), pp. 82-85, 2010.

  • 努尔买买提·黑力力,罗振兴,林作铨,“基于XACML的访问控制与RBAC限制,” 计算机工程, 34(8), pp.19-21, 2008.

  • Nuermaimaiti Heilili, Yang Chen, Chen Zhao, Zhenxing Luo, and Zuoquan Lin, “An OWL-Based Approach for RBAC with Negative Authorization,” Knowledge Science, Engineering and Management: First International Conference, Springer, LNAI 4092, pp. 164-175, 2006 (SCI).

  • Zhenxing Luo, Nuermaimaiti Heilili, Zuoquan Lin, “A Flexible Applicable RBAC Model and Its Administration,” 18th International Conference on Database and Expert Systems Applications - DEXA '07 (DEXA 2007), pp.192-196, 2007 (EI).

  • 罗振兴,努尔买买提·黑力力,徐大伟,赵琛,林作铨,“基于Java 新IO的Web安全网关,” 计算机工程,33(7), pp.107-109, 2007.

  • Zhenxing Luo, Nuermaimaiti Heilili, Dawei XU, Chen Zhao, Zuoquan Lin, “Web Application Security Gateway with Java Non-Blocking IO,” The 6th Workshop on Next Generation Information Technologies and Systems, Springer, LNCS 4032, pp. 96-105, 2006 (SCI).

  • Chen Zhao, Nuermaimaiti Heilili, Shengping Liu, and Zuoquan Lin., “Representation and Reasoning on RBAC: A Description Logic Approach,” In ICTAC05 - International Colloquium on Theoretical Aspects of Computing, Springer, LNCS 3722, pp. 381-393, 2005 (SCI).

  • Chen Zhao, Yang Chen, Dawei Xu, Nuermaimaiti Heilili, and Zuoquan Lin, “Integrative Security Management for Web-Based Enterprise Applications,” In International Conference on Web-Age Information Management, Springer, LNCS 3739, pp. 618-625, 2005 (SCI).

  • Chen Zhao, Nuermaimaiti Heilili, Shengping Liu, and Zuoquan Lin., “Using Description Logic to Formalize Role-Based Access Control Model,” In International Workshop on Description Logics - DL2005, Edinburgh, Scotland, UK, July 26-28, 2005.

  • 努尔买买提·黑力力, 开依沙尔·热合曼. “数理逻辑课程的教学方法简谈,” 新疆师范大学学报:自然科学版, 2010, 29(3):104-107.


 

指导研究生

  • 在校生

    买尔哈巴·买买提明(博), 阿不都艾尼·阿不都西库尔(博), 陈阳(硕), 刘炜(硕), 郭婷(硕), 何苗(硕), 赵永丹(硕), 王鸿(硕), 迪力尼亚·迪力夏提(硕), 萨吉达木·吐尔孙(硕), 朱旭泽(硕), 林冬璇(硕), 魏昶达(硕).

  • 已毕业员工

    阿不都艾尼·阿不都西库尔(硕), 陈成(硕),  迪力夏提·吾普尔(硕), 古丽米热·尔肯(硕), 韩舒艳(硕), 杜佳婕(硕), 安燕(硕), 雷雪娇(硕), 古丽博斯坦·阿克木(硕), 王银龙(硕), 王娟(硕), 全杉(硕).

 

Short Bio - Nurmamat Helil

Nurmamat Helil received his B.S., M.S. and Ph.D. degrees in School of Mathematical Sciences, Peking University in 2000, 2003 and 2008, respectively. He is a full Professor of College of Mathematics and System Science, Xinjiang University, China. From April 2010 to April 2011, he worked as a post-doctor in School of Computer Science and Engineering, Chung-Ang University, Korea. From April 2016 to April 2017, he worked as a Visiting Research Scholar in Department of Computer Science and Engineering, University of Minnesota Twin Cities, USA. His research interests include information system security, access control, and cloud storage security.

 

关闭窗口
通知公告 更多>>
· 关于2023级数学与应用数...
· 关于公布2022年全国大学...
· 2021年火箭军直接选拔招...
· 学术报告(2018年5月3日 ...
· 申请举办伟德BETVlCTOR1946“天山...

伟德BETVLCTOR体育 版权所有
地址:新疆维吾尔自治区乌鲁木齐水磨沟区华瑞街777号

联系电话:0991-8582482         邮编:830017