En
  • دکتری (1394)

    مهندسی کامپیوتر

    دانشگاه صنعتی شریف، تهران، ایران

  • کارشناسی‌ارشد (1388)

    مهندسی فناوری اطلاعات - شبکه‌های کامپیوتری

    دانشگاه صنعتی شریف، تهران، ایران

  • کارشناسی (1386)

    مهندسی کامپیوتر - مهندسی نرم‌افزار

    دانشگاه تهران، تهران، ایران

  • فناوری زنجیره قالب‌ها (بلاکچین)
  • امنیت، حریم خصوصی، و اعتماد
  • سیستم‌های توزیع شده (ابر، همتا به همتا، توری)
  • رمزارزها
  • آزمایشگاه زنجیره قالب‌ها (بلاکچین)

صادق دری نوگورانی مدرک کارشناسی خود را در سال ۸۶ در رشته مهندسی کامپیوتر از دانشگاه تهران دریافت کرد. پس از آن در سال ۸۸ مدرک کارشناسی ارشد خود را در رشته مهندسی فناوری اطلاعات شبکه از دانشگاه شریف دریافت کرد. وی در همین سال دوره دکتری مهندسی کامپیوتر را در دانشگاه شریف آغاز کرد و در سال ۹۴ موفق به اخذ مدرک دکتری در این رشته شد. گذشته از سوابق تدریس و مقالات پژوهشی، وی تجربه برگزاری چندین کارگاه آموزشی و اجرای چندین طرح پژوهشی دانشگاهی را در سطوح مختلف دارد.

ارتباط

رزومه

Collection and Analysis of Financial Exchange Data on the Stellar Blockchain

Reza Hamidpour Badoe, Sadegh Dorri Nogoorani
Conference PapersThe 6th National Conference on Distributed Computing and Big Data Processing, Azarbaijan Shahid Madani University, Tabriz, Iran , 2021 March , {Pages }

Abstract

Invoice Factoring Registration Based on a Public Blockchain

Nasibeh Mohammadzadeh, Sadegh Dorri Nogoorani, Jos? Luis Mu?oz-Tapia
Journal PapersIEEE Access , Volume 9 , 2021 February 2, {Pages 24221-24233 }

Abstract

Invoice factoring is a very useful tool for developing businesses that face liquidity problems. The main property that a factoring system needs to fulfill is to prevent an invoice from being factored twice. In order to prevent double factoring, many factoring ecosystems use one or several centralized entities to register factoring agreements. However, this puts a lot of power in the hands of these centralized entities and makes it difficult for users to dispute situations in which factoring data is unavailable, wrongly recorded or manipulated by negligence or on purpose. In this article, we propose an architecture for invoice factoring registration based on a public blockchain. To solve the aforementioned drawbacks, we replace the trusted t

Decentralized Factoring for Self-Sovereign Identities

N Mohammadzadeh, S Dorri Nogoorani, JL Muñoz-Tapia
Journal Papers , , {Pages }

Abstract

A Decentralized App Store Using the Blockchain Technology

Mahsa Monem Moharrer, Sadegh Dorri Nogoorani
Conference PapersISCISC 2020, Iran University of Technology, Tehran, Iran , 2020 September 9, {Pages }

Abstract

A Mechanism for Owner to Monitor Smart Contracts on Ethereum (in Persian)

Morteza Amirmohseni, Sadegh Dorri Nogoorani
Conference PapersISCISC 2020, Iran University of Technology, Tehran, Iran , 2020 September 9, {Pages }

Abstract

Blockchain Technology and Its Applications in Supplychain (in Persian)

Sadegh Dorri Nogoorani
Conference PapersThe 16th Iranian Internatinal Industrial Engineering Conference, Al-Zahra University, Tehran, Iran , 2020 January 22, {Pages 5094-5105 }

Abstract

A Decentralized App Store Using the Blockchain Technology

Mahsa Monem Moharrer, Sadegh Dorri Nogoorani
Conference Papers17th International ISC Conference on Information Security and Cryptology (ISCISC 2020) , 2020 September 9, {Pages 14-21 }

Abstract

Today, applications have become an important part of the ecosystem of smartphones. With the increasing use of applications, key issues such as avoidance of single point of failure, availability, throughput problem, ensuring software authenticity, protecting the intellectual property rights of application developers have become areas that have a significant impact on this ecosystem. In this paper, we introduce the first autonomous decentralized mobile application distribution platform (app store) that utilizes blockchain, smart contracts and a distributed file system to fulfill the aforementioned requirements. With the use of smart contracts, this app store works autonomously, and its management is not centralized. In addition, the app store

TIRIAC: A trust-driven risk-aware access control framework for Grid environments

Sadegh Dorri Nogoorani, Rasool Jalili
Journal PapersFuture Generation Computer Systems , Volume 55 , 2016 February , {Pages 238-254 }

Abstract

The infrastructure provided by a Grid enables researchers to collaboratively solve various research problems through sharing their resources and establishing virtual organizations (VOs). However, the distributed and dynamic nature of a Grid VO is a challenge for access control systems. All users in a VO have responsibilities which correspond to their rights. While they should be able to make use of all VO resources, irresponsibility and permission misuse (insider attack) impose costs and losses on the affected resources. Hence, the history of users’ behavior and the possibility of misuse need to be considered in the resource providers’ risk management process. In this paper, we propose the TIRIAC framework for Grid access control. TIRIA

Uncertainty in trust: a risk-aware approach

Sadegh Dorri Nogoorani, Rasool Jalili
Journal PapersInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems , Volume 24 , Issue 05, 2016 October , {Pages 703-737 }

Abstract

Uncertainty and its imposed risk have significant impacts on decision-making. However, both are disregarded in many trust-based applications. In this paper, we propose a risk-aware approach to explicitly take uncertainty of trust and its effects into account. Our approach consists of a trust, a confidence, and a risk model. We do not prescribe a specific trust model, and any probabilistic trust model can be empowered by our approach. The confidence model calculates the uncertainty of the trust model in the form of a confidence interval, and is independent of the inner-workings of the trust model. This interval is used by the utility-based risk model which assesses the effects of uncertainty on trust-based decisions. We evaluated our approac

A Collusion Mitigation Scheme for Reputation Systems

Mina Niknafs, Sadegh Dorri Nogoorani, Rasool Jalili
Journal PapersThe ISC International Journal of Information Security (ISeCure) , Volume 7 , Issue 2, 2016 January 6, {Pages }

Abstract

Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of colluders is shown to be an NP-complete problem. In this paper, we propose the Colluders Similarity Measure (CSM) which is used by a heuristic clustering algorithm (the Colluders Detection Algorithm (CDA)) to detect colluders in O (n 2 m+ n 4) in which m and n are the total number of nodes and colluders, respectively. Furthermore, we propose an architect

CR-SMTC: Privacy preserving collusion-resistant multi-party trust computation

Zohre Fath Fathabadi, Sadegh Dorri Nogoorani, Ali Mohammad Hemmatyar
Conference PapersThe 11th International ISC Conference on Information Security and Cryptology (ISCISC) , 2014 September 3, {Pages 167-172 }

Measuring Software Security Using SAN Models

Sadegh Dorri Nogoorani, Mohammad Ali Hadavi, Rasool Jalili
Conference PapersThe 9th ISC International Conference on Information Security and Cryptology, Tabriz, Iran , 2012 September , {Pages 80-86 }

Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach

Simin Ghasemi, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani, Rasool Jalili
Journal Papers , 2012 December , {Pages 343-351 }

Abstract

An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward the service provider increases, the n

Uncertainty in Probabilistic Trust Models

Sadegh Dorri Nogoorani, Rasool Jalili
Conference PapersThe 26th IEEE International Conference on Advanced Information Networking and Applications (AINA 2012), Fukuoka, Japan , 2012 March , {Pages 511-517 }
/pro/academic_staff/dorri/publication

دروس نیمسال جاری

  • كارشناسي ارشد
    رايانش ابري ( واحد)
    دانشکده مهندسی برق و کامپیوتر، گروه مهندسي كامپيوتر
  • كارشناسي ارشد
    امنيت تجارت الكترونيكي ( واحد)
  • كارشناسي ارشد
    امنيت سيستم هاي اطلاعات ( واحد)

دروس نیمسال قبل

  • كارشناسي ارشد
    اصول جرم يابي ديجيتال ( واحد)
    دانشکده مهندسی برق و کامپیوتر، گروه معماري سيستم هاي كامپيوتري
  • كارشناسي ارشد
    اصول جرم يابي ديجيتال ( واحد)
  • كارشناسي ارشد
    امنيت و حريم خصوصي داده ( واحد)
  • كارشناسي ارشد
    روش تحقيق ( واحد)
  • 1400
    تقي پوركلائي, زهرا
    بستر تبادل انرژي در شبكه هوشمند برق با حفظ حريم خصوصي و مبتني بر محاسبات نامتمركز
  • 1400
    شكيبا, اميرحسين
  • 1397
    سيرت, شاجهان
    ارائه راهكاري براي زنجيره قالبي مبتني برشبكه نامگذاري شده با داده
    داده ای یافت نشد
    داده ای یافت نشد
    داده ای یافت نشد

مهم

جدید

    اطلاعیه ای درج نشده است