Department of Computer System Architecture (2017 - Present)
Computer Engineering
Department of Computer Engineering, Sharif University of Technology, Tehran, Iran
Information Technology - Computer Networks
Department of Computer Engineering, Sharif University of Technology, Tehran, Iran
Computer Engineering - Software Engineering
School of Electrical and Computer Engineering, University of Tehran, Tehran, Iran
Sadegh Dorri Nogoorani received his BS degree in Software Engineering from University of Tehran in 2007 and his MS degree in Information Technology from Sharif University of Technology in 2009. He earned his PhD in Computer Engineering from Sharif University of Technology in Feb 2016. In addition to teaching and academic research experience, he has conducted several workshops in the field of computer security and has taken part in several research projects.
Invoice factoring is a very useful tool for developing businesses that face liquidity problems. The main property that a factoring system needs to fulfill is to prevent an invoice from being factored twice. In order to prevent double factoring, many factoring ecosystems use one or several centralized entities to register factoring agreements. However, this puts a lot of power in the hands of these centralized entities and makes it difficult for users to dispute situations in which factoring data is unavailable, wrongly recorded or manipulated by negligence or on purpose. In this article, we propose an architecture for invoice factoring registration based on a public blockchain. To solve the aforementioned drawbacks, we replace the trusted t
Today, applications have become an important part of the ecosystem of smartphones. With the increasing use of applications, key issues such as avoidance of single point of failure, availability, throughput problem, ensuring software authenticity, protecting the intellectual property rights of application developers have become areas that have a significant impact on this ecosystem. In this paper, we introduce the first autonomous decentralized mobile application distribution platform (app store) that utilizes blockchain, smart contracts and a distributed file system to fulfill the aforementioned requirements. With the use of smart contracts, this app store works autonomously, and its management is not centralized. In addition, the app store
The infrastructure provided by a Grid enables researchers to collaboratively solve various research problems through sharing their resources and establishing virtual organizations (VOs). However, the distributed and dynamic nature of a Grid VO is a challenge for access control systems. All users in a VO have responsibilities which correspond to their rights. While they should be able to make use of all VO resources, irresponsibility and permission misuse (insider attack) impose costs and losses on the affected resources. Hence, the history of users’ behavior and the possibility of misuse need to be considered in the resource providers’ risk management process. In this paper, we propose the TIRIAC framework for Grid access control. TIRIA
Uncertainty and its imposed risk have significant impacts on decision-making. However, both are disregarded in many trust-based applications. In this paper, we propose a risk-aware approach to explicitly take uncertainty of trust and its effects into account. Our approach consists of a trust, a confidence, and a risk model. We do not prescribe a specific trust model, and any probabilistic trust model can be empowered by our approach. The confidence model calculates the uncertainty of the trust model in the form of a confidence interval, and is independent of the inner-workings of the trust model. This interval is used by the utility-based risk model which assesses the effects of uncertainty on trust-based decisions. We evaluated our approac
Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of colluders is shown to be an NP-complete problem. In this paper, we propose the Colluders Similarity Measure (CSM) which is used by a heuristic clustering algorithm (the Colluders Detection Algorithm (CDA)) to detect colluders in O (n 2 m+ n 4) in which m and n are the total number of nodes and colluders, respectively. Furthermore, we propose an architect
An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward the service provider increases, the n
no record found