Loading...
Search for: outsourcing
0.007 seconds
Total 54 records

    A robust R&D project portfolio optimization model for pharmaceutical contract research organizations

    , Article International Journal of Production Economics ; Vol. 158, issue , 2014 , p. 18-27 Hassanzadeh, F ; Modarres, M ; Nemati, H. R ; Amoako-Gyampah, K ; Sharif University of Technology
    Abstract
    Pharmaceutical drug Research and Development (R&D) outsourcing to contract research organizations (CROs) has experienced a significant growth in recent decades and the trend is expected to continue. A key question for CROs and firms in similar environments is which projects should be included in the firm's portfolio of projects. As a distinctive contribution to the literature this paper develops and evaluates a business support tool to help a CRO decide on clinical R&D project opportunities and revise its portfolio of R&D projects given the existing constraints, and financial and resource capabilities. A new mathematical programming model in the form of a capital budgeting problem is... 

    Modeling and solving a capacitated stochastic location-allocation problem using sub-sources

    , Article Soft Computing ; Volume 20, Issue 6 , 2016 , Pages 2261-2280 ; 14327643 (ISSN) Alizadeh, M ; Mahdavi Amiri, N ; Shiripour, S ; Sharif University of Technology
    Springer Verlag 
    Abstract
    We study a capacitated multi-facility location-allocation problem in which the customers have stochastic demands based on Bernoulli distribution function. We consider the capacitated sub-sources of facilities to satisfy demands of customers. In the discrete stochastic problem, the goal is to find optimal locations of facilities among candidate locations and optimal allocations of existing customers to operating facilities so that the total sum of fixed costs of operating facilities, allocation cost of the customers, expected values of servicing and outsourcing costs is minimized. The model is formulated as a mixed-integer nonlinear programming problem. Since finding an optimal solution may... 

    A verifiable delegated set intersection without pairing

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 2047-2051 ; 9781509059638 (ISBN) Mahdavi Oliaiy, M ; Ameri, M. H ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
    Abstract
    Recently, there has been shown a great interest in the private set intersection (PSI) protocols which are widely used in social networks applications. In a PSI protocol two entities are able to find the intersection of their document set without inferring more information than the common data. In some PSI protocols the process of finding the intersections of the documents are delegated to a third entity like cloud which has high computational and storage resources and the clients can verify the accuracy of the received results. These protocols are known as the Verifiable Delegated Set Intersection (VDSI). In this paper, we proposed an efficient VDSI protocol by employing the El-Gamal... 

    A new extended analytical hierarchy process technique with incomplete intervalvalued information for risk assessment in IT outsourcing

    , Article International Journal of Engineering, Transactions B: Applications ; Volume 30, Issue 5 , 2017 , Pages 739-748 ; 1728144X (ISSN) Ebrahimnejad, S ; Gitinavard, H ; Sohrabvandi, S ; Sharif University of Technology
    Abstract
    Information technology (IT) outsourcing has been recognized as a new methodology in many organizations. Yet making an appropriate decision with regard to selection and use of these methodologies may impose uncertainties and risks. Estimating the occurrence probability of risks and their impacts organizations goals may reduce their threats. In this study, an extended analytical hierarchical process method is tailored based on interval-valued hesitant fuzzy information to assess the risks in IT outsourcing. In the proposed approach, the weight of each decision maker is implemented in process of the proposed method by considering the concept of simple additive weighting method to decrease the... 

    Enforcing access control policies over data stored on untrusted server

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 54-57 ; 9781538665602 (ISBN) Soltani, N ; Jalili, R ; Sharif University of Technology
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner's access control policies. This includes some challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies. Most of the existing solutions address only some of the challenges, while they impose high overhead on both the data owner and users. Though, policy management in the Role-Based Access Control (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions... 

    Determining Strategic Direction of IT Process Outsourcing in Banking Industry Using Analytical Hierarchy Process (AHP) Technique Case Study: Karafarin Bank

    , M.Sc. Thesis Sharif University of Technology Kordzadeh, Nima (Author) ; Isaai, Mohammad Taghi (Supervisor)
    Abstract
    Due to the strategic importance of IT, there exists an undeniable need for a systematic analysis before deciding whether or not a particular IT process should be outsourced. A study that provides a systematic analysis for evaluating components of the company's IT for outsourcing may be useful to practitioners. In this research, analytic hierarchy process (AHP) is proposed as a suitable technique for analyzing information systems outsourcing decision. An IT outsourcing case is used to demonstrate the usefulness of the proposed approach. "Super Decisions" is used to implement the AHP  

    Critical Success Factors in Outsourcing of Construction Projects; Client’s Perspective (Case Study: Tehran Municipality)

    , M.Sc. Thesis Sharif University of Technology Haghnazar, Mohammad Ali (Author) ; Sepehri, Mehran (Supervisor)
    Abstract
    Outsourcing has considerably increased in number, as evident by the literature. Many activities, once being carried out by the organization itself, are now accomplished by contractors. Nowadays, implementing successful outsourcing projects is an important and challenging deal for outsourcer organizations. Such organizations always aim to finish their projects based on a defined scope of time, budget and quality while accepted by the final customer. Managers are trying to use outsourcing strategy more extensively but are faced with various problems in practice. So it’s advantageous to perform a research to identify these difficulties to be able to employ this strategy more efficiently. Due to... 

    Definition of Model For Evaluation of Paint Shops Outsourcing In Car Manufacturing Company

    , M.Sc. Thesis Sharif University of Technology Salehi, Hamid Reza (Author) ; Eshraghniaye Jahromi, Abdolhamid (Supervisor)
    Abstract
    Decreasing cost, enhancing quality, increasing the customer satisfaction and the productivity to gain farther market shares are among the reasons for urging the companies to outsource their needs. In this study the definition of outsourcing, its advantages and weaknesses and the risks associated with it are presented and then models for decision making on outsourcing and its implementation process are discussed. As a scope for this mention, then the evaluation of outsourcing procedures for the paint shops is selected and studied. A model for the case is also presented. The case study is undertaken in Iran Khodro's paint shop during the years: 1379 – 1384 as a practical case. We can summarize... 

    Query Correctness Assurance for Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Noferesti, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were... 

    A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Simin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,... 

    Providing Confidentiality of Outsourced Data through Fragmentation

    , M.Sc. Thesis Sharif University of Technology Dodangeh, Peyman (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing is considered as a promising approach in today computing and connected world. This approach enables organizations to outsource their data to anexternal third party server which is responsible for storing and propagation of outsourced data. Although data outsourcing offers many benefits, especially for those organizations with limited resources and increaseing data volume, but this approach in security aspects like providing confidentiality and privacy about curious external third party or other threats, is faced by serious challenges. In the recent decade many approaches for solving or at least decreasing the potential threats over providing confidentiality of outsourced... 

    A Secure DBMS Architecture to Preserve Data Privacy, Confidentiality, and Integrity

    , M.Sc. Thesis Sharif University of Technology Halvachi, Hadi (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    While data outsourcing provides some benefits, it suffers from new privacy and security concerns, mainly about the confidentiality and integrity of the stored sensitive data, as well as enforcing access control policies. Current solutions to these aims are not comprehensive and consider only one aspect of security requirements. A secure DBMS architecture is introduced that simultaneously considers confidentiality, integrity and access control enforcement requirements. The transparency of security functions from data owner, service providers, and applications facilitates the operationality of the solution.Additionally, a new indexing technique for character encrypted data is proposed that... 

    A Secrecy-Preserving Access Control in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Karimi, Leila (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes three challenges; 1) the average number of keys needed to access authorized resources, 2) efficient update of policies, and 3) confidentiality of data owner’s access control policies. Most of the existing proposed solutions address only one of these challenges, while they impose high overhead on both the data owner and users. Such an overhead prevents the model to be implemented in practical applications. In this thesis, we propose an approach to address all the aforementioned challenges with acceptable overhead. In this approach, which is based on selective... 

    Using Functional Encryption to Manage Encrypted Data

    , M.Sc. Thesis Sharif University of Technology Mahfoozi, Rohollah (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Recently, many organizations outsource their data on an external server to rescue the trouble of data maintenance. But, data owners do not trust in the external server to enforce defined access control policies. In recent years, many researches was dedicated to cryptographic access control on outsourced data, in order to solve this problem. We introduce a method based on Attribute-based Encryption to enforce access control on outsourced data. In this method we consider policy updating and administrative access control. As a result The owner is not only able to change access control policies on outsourced data but also to define administrative rights (grant/revoke) for some admin users. Our... 

    Developing an Integrated Framework for Outsourcing in the Auto Industry

    , M.Sc. Thesis Sharif University of Technology Motamedi, Sadegh (Author) ; Sheikhzadeh, Mehdi (Supervisor)
    Abstract
    Outsourcing is currently a challenging issue in the auto industry. On one hand, outsourcing has be-come a competitive imperative for automakers due to its significant benefits. On the other hand, it involves many aspects of risks that could potentially hurt core competencies of a firm. As such, in the auto industry, it is highly critical to make optimal outsourcing decisions for which an integrated framework offering a holistic view seems quite necessary. In this thesis, based on four fundamental research questions of “Who?”, “What?”, “Whom?” and “How?”, an integrated framework for outsourcing in the auto industry is developed in order to identify effective outsourcing factors and associated... 

    Confidential Access to the Outsourced Relational Data

    , M.Sc. Thesis Sharif University of Technology NajmAbadi, Elahe Sadat (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    In recent years, there has been a trend toward outsourcing data to the cloud provider. These companies must tackle the data security challenges. Generally these parties are assumed to be honest but curious. In past years, the research communities have been investigating different solution to ensure confidentiality.
    In addition to data confidentiality access and pattern confidentiality is a high-priority issue in some cases so. potential adversary should be unable to drive information from the observed access pattern to the outsourced data. Despite the fact that there are more investigation in the field of data confidentiality, concern over data security are the rise in outsourcing data,... 

    Fourth Party Training (4PT)Concepts and Business Model

    , M.Sc. Thesis Sharif University of Technology Asadollahi, Elham (Author) ; Akbari Jokar, Mohammad Reza (Supervisor)
    Abstract
    Success in a business will be met by the different factors, of which one of the most important is design and execution of a good business model upon the inauguration of each company. Indicating the commercialization of innovations and innovative commercial ideas, it shows the productivity of innovation. Outsourcing the Training management in organizations is an issue the world pioneer organizations feel its necessity. Training systems in organizations have limited resources, don't have the required knowledge and financial sufficiency for effective execution of all Training processes. Therefore, Training management outsourcing may be a good alternative for meeting perspective and facilitating... 

    Enforcing Access Control Policies over Data Stored on Untrusted Server

    , M.Sc. Thesis Sharif University of Technology Soltani, Naeimeh (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Recently many organizations outsource their data to an external server due to easier data maintenance. One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes some challenges; namely, the number of keys needed to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies . Most of the existing proposed solutions address only some of these challenges, while they impose high overhead on both the data owner and users. Moreover, most of them address enfrocement of policies in form of access control matrix and... 

    A Confidentiality and Integrity Preserving Architecture for Secure Data Outsourcing

    , M.Sc. Thesis Sharif University of Technology Shahrokhi, Hesamoddin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Infrastructural costs of data management, have led people and organizations to outsource their data. This approach is facing with some significant security challenges and risks. The goal of this research, is to present an architecture for secure outsourcing of data in a way that used methods, storage processes, query processing methods and access control mechanisms work together to preserve confidentiality and integrity of outsourced data. In this architecture, the main challenge is transparent placement of some components between client and server in order to prevent user from being aware of communication with a secured server. In order to create this degree of transparency, we need to pay... 

    An Approach for Secure Data Outsourcing

    , Ph.D. Dissertation Sharif University of Technology Hadavi, Mohammad Ali (Author) ; alili, Rasool (Supervisor)
    Abstract
    Data outsourcing is an approach to delegate the burden of data management to external servers. In spite of its clear advantages, data outsourcing requires security assurances including data confidentiality, query result correctness, and access control enforcement. Research proposals have identified solutions with disparate assumptions for different security requirements. It is a real obstacle towards having an integrated solution through the combination of existing approaches. The practicality of data outsourcing to the cloud is seriously affected by this challenge. In this thesis, a unified view based on secret sharing is proposed to simultaneously achieve confidentiality, correctness, and...