Categories: General
      Date: Jan 29, 2016
     Title: Welcome to new faculty: Dr. Meng Yu


Dr. Meng Yu became an associate professor at the University of Texas at San Antonio in the fall of 2015. He received his Ph.D. degree from Nanjing University in 2001.

His research interests include systems and network security, visualization and security, and cloud computing. His primary research goal is to build more secure and trustworthy system software.

He has been working on security problems such as privacy protection in cloud computing, self-healing problem after attacks, and the protection of applications against untrusted operating systems. The key method is to protect the target using a small trusted software component at higher privileged level while maintaining a small trusted computing base (TCB).

He has also worked on projects seeking to protect users’ privacy in clouds. His research studies new mechanisms that enable the consumer of the service to reduce the visibility of consumer computations to the service provider, thereby reducing the trust that the consumer places in the provider. Simultaneously, the mechanisms allow security of cloud computing environments to be monitored by a trusted third party. The work also develops a quantified method to evaluate the degree to which a user's privacy is disclosed and tools for monitoring causality relationships.

His research has been supported by funding agencies such as National Science Foundation. He has served on many conference program committees and also organized several international conferences and workshops.

Dr. Yu looks forward to opportunities for collaboration and career development at UTSA.


 

 

Dr. Meng Yu became an associate professor at the University of Texas at San Antonio in the fall of 2015. He received his Ph.D. degree from Nanjing University in 2001.

His research interests include systems and network security, visualization and security, and cloud computing. His primary research goal is to build more secure and trustworthy system software.

He has been working on security problems such as privacy protection in cloud computing, self-healing problem after attacks, and the protection of applications against untrusted operating systems. The key method is to protect the target using a small trusted software component at higher privileged level while maintaining a small trusted computing base (TCB).

His research has been supported by funding agencies such as National Science Foundation. He has served on many conference program committees and also organized several international conferences and workshops.