Fa
  • Ph.D. (2015)

    Computer Engineering

    Department of Computer Engineering, Sharif University of Technology, Tehran, Iran

  • M.Sc. (2009)

    Information Technology - Computer Networks

    Department of Computer Engineering, Sharif University of Technology, Tehran, Iran

  • B.Sc. (2007)

    Computer Engineering - Software Engineering

    School of Electrical and Computer Engineering, University of Tehran, Tehran, Iran

  • Blockchain Technology
  • Security, Privacy, and Trust
  • Distributed Systems (Cloud, P2P, Grid)
  • Cryptocurrency

    Sadegh Dorri Nogoorani received his BS degree in Software Engineering from University of Tehran in 2007 and his MS degree in Information Technology from Sharif University of Technology in 2009. He earned his PhD in Computer Engineering from Sharif University of Technology in Feb 2016. In addition to teaching and academic research experience, he has conducted several workshops in the field of computer security and has taken part in several research projects.

    Contact

    Curriculum Vitae (CV)

    Collection and Analysis of Financial Exchange Data on the Stellar Blockchain

    Reza Hamidpour Badoe, Sadegh Dorri Nogoorani
    Conference PaperThe 6th National Conference on Distributed Computing and Big Data Processing, Azarbaijan Shahid Madani University, Tabriz, Iran , 2021 March , {Pages }

    Abstract

    Invoice Factoring Registration Based on a Public Blockchain

    Nasibeh Mohammadzadeh, Sadegh Dorri Nogoorani, Jos? Luis Mu?oz-Tapia
    Journal PaperIEEE Access , Volume 9 , 2021 February 2, {Pages 24221-24233 }

    Abstract

    Invoice factoring is a very useful tool for developing businesses that face liquidity problems. The main property that a factoring system needs to fulfill is to prevent an invoice from being factored twice. In order to prevent double factoring, many factoring ecosystems use one or several centralized entities to register factoring agreements. However, this puts a lot of power in the hands of these centralized entities and makes it difficult for users to dispute situations in which factoring data is unavailable, wrongly recorded or manipulated by negligence or on purpose. In this article, we propose an architecture for invoice factoring registration based on a public blockchain. To solve the aforementioned drawbacks, we replace the trusted t

    Decentralized Factoring for Self-Sovereign Identities

    N Mohammadzadeh, S Dorri Nogoorani, JL Muñoz-Tapia
    Journal Paper , , {Pages }

    Abstract

    A Decentralized App Store Using the Blockchain Technology

    Mahsa Monem Moharrer, Sadegh Dorri Nogoorani
    Conference PaperISCISC 2020, Iran University of Technology, Tehran, Iran , 2020 September 9, {Pages }

    Abstract

    A Mechanism for Owner to Monitor Smart Contracts on Ethereum (in Persian)

    Morteza Amirmohseni, Sadegh Dorri Nogoorani
    Conference PaperISCISC 2020, Iran University of Technology, Tehran, Iran , 2020 September 9, {Pages }

    Abstract

    Blockchain Technology and Its Applications in Supplychain (in Persian)

    Sadegh Dorri Nogoorani
    Conference PaperThe 16th Iranian Internatinal Industrial Engineering Conference, Al-Zahra University, Tehran, Iran , 2020 January 22, {Pages 5094-5105 }

    Abstract

    A Decentralized App Store Using the Blockchain Technology

    Mahsa Monem Moharrer, Sadegh Dorri Nogoorani
    Conference Paper17th International ISC Conference on Information Security and Cryptology (ISCISC 2020) , 2020 September 9, {Pages 14-21 }

    Abstract

    Today, applications have become an important part of the ecosystem of smartphones. With the increasing use of applications, key issues such as avoidance of single point of failure, availability, throughput problem, ensuring software authenticity, protecting the intellectual property rights of application developers have become areas that have a significant impact on this ecosystem. In this paper, we introduce the first autonomous decentralized mobile application distribution platform (app store) that utilizes blockchain, smart contracts and a distributed file system to fulfill the aforementioned requirements. With the use of smart contracts, this app store works autonomously, and its management is not centralized. In addition, the app store

    TIRIAC: A trust-driven risk-aware access control framework for Grid environments

    Sadegh Dorri Nogoorani, Rasool Jalili
    Journal PaperFuture Generation Computer Systems , Volume 55 , 2016 February , {Pages 238-254 }

    Abstract

    The infrastructure provided by a Grid enables researchers to collaboratively solve various research problems through sharing their resources and establishing virtual organizations (VOs). However, the distributed and dynamic nature of a Grid VO is a challenge for access control systems. All users in a VO have responsibilities which correspond to their rights. While they should be able to make use of all VO resources, irresponsibility and permission misuse (insider attack) impose costs and losses on the affected resources. Hence, the history of users’ behavior and the possibility of misuse need to be considered in the resource providers’ risk management process. In this paper, we propose the TIRIAC framework for Grid access control. TIRIA

    Uncertainty in trust: a risk-aware approach

    Sadegh Dorri Nogoorani, Rasool Jalili
    Journal PaperInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems , Volume 24 , Issue 05, 2016 October , {Pages 703-737 }

    Abstract

    Uncertainty and its imposed risk have significant impacts on decision-making. However, both are disregarded in many trust-based applications. In this paper, we propose a risk-aware approach to explicitly take uncertainty of trust and its effects into account. Our approach consists of a trust, a confidence, and a risk model. We do not prescribe a specific trust model, and any probabilistic trust model can be empowered by our approach. The confidence model calculates the uncertainty of the trust model in the form of a confidence interval, and is independent of the inner-workings of the trust model. This interval is used by the utility-based risk model which assesses the effects of uncertainty on trust-based decisions. We evaluated our approac

    A Collusion Mitigation Scheme for Reputation Systems

    Mina Niknafs, Sadegh Dorri Nogoorani, Rasool Jalili
    Journal PaperThe ISC International Journal of Information Security (ISeCure) , Volume 7 , Issue 2, 2016 January 6, {Pages }

    Abstract

    Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of colluders is shown to be an NP-complete problem. In this paper, we propose the Colluders Similarity Measure (CSM) which is used by a heuristic clustering algorithm (the Colluders Detection Algorithm (CDA)) to detect colluders in O (n 2 m+ n 4) in which m and n are the total number of nodes and colluders, respectively. Furthermore, we propose an architect

    CR-SMTC: Privacy preserving collusion-resistant multi-party trust computation

    Zohre Fath Fathabadi, Sadegh Dorri Nogoorani, Ali Mohammad Hemmatyar
    Conference PaperThe 11th International ISC Conference on Information Security and Cryptology (ISCISC) , 2014 September 3, {Pages 167-172 }

    Measuring Software Security Using SAN Models

    Sadegh Dorri Nogoorani, Mohammad Ali Hadavi, Rasool Jalili
    Conference PaperThe 9th ISC International Conference on Information Security and Cryptology, Tabriz, Iran , 2012 September , {Pages 80-86 }

    Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach

    Simin Ghasemi, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani, Rasool Jalili
    Journal Paper , 2012 December , {Pages 343-351 }

    Abstract

    An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward the service provider increases, the n

    Uncertainty in Probabilistic Trust Models

    Sadegh Dorri Nogoorani, Rasool Jalili
    Conference PaperThe 26th IEEE International Conference on Advanced Information Networking and Applications (AINA 2012), Fukuoka, Japan , 2012 March , {Pages 511-517 }

    Current Teaching

    • MS.c.

      Cloud Computing

    • MS.c.

      Electronic Commerce Security

    • MS.c.

      Information Systems Security

    Teaching History

    • MS.c.

      Concepts of Digital Forensics

    • MS.c.

      Data Security and Privacy

    • MS.c.

      Research Methodology

    • 2021
      Taghipoor, Zahra
      Privacy preserving and decentralized computing energy trading platform in smart grid
    • 2021
      Shakiba, Amirhosein
    • 2018
      Sirat, Shah Jahan
      A Blockchain based on Named Data Networking
      Data not found

    Top

    New

      no record found