Loading...
Search for: outsourcing
0.005 seconds
Total 54 records

    Single machine scheduling problem with batch outsourcing

    , Article International Journal of Engineering, Transactions B: Applications ; Volume 35, Issue 5 , 2022 , Pages 1006-1016 ; 1728144X (ISSN) Safarzadeh, H ; Kianfar, F ; Sharif University of Technology
    Materials and Energy Research Center  2022
    Abstract
    Outsourcing as a useful strategy in the industry can be integrated into scheduling problems. Moreover, batch outsourcing is a practical assumption owing to the logistics issues for transferring the parts between the manufacturer and the subcontractors. However, this assumption is rarely addressed in the scheduling literature. In this paper, a novel single machine scheduling problem with the option of batch outsourcing is studied. The objective is to minimize the sum of the total completion time of the jobs and the total outsourcing cost. To solve the problem, first, two mixed-integer linear programming (MILP) models, named MP1 and MP2, are developed, which respectively use a straightforward... 

    Determining Strategic Direction of IT Process Outsourcing in Banking Industry Using Analytical Hierarchy Process (AHP) Technique Case Study: Karafarin Bank

    , M.Sc. Thesis Sharif University of Technology Kordzadeh, Nima (Author) ; Isaai, Mohammad Taghi (Supervisor)
    Abstract
    Due to the strategic importance of IT, there exists an undeniable need for a systematic analysis before deciding whether or not a particular IT process should be outsourced. A study that provides a systematic analysis for evaluating components of the company's IT for outsourcing may be useful to practitioners. In this research, analytic hierarchy process (AHP) is proposed as a suitable technique for analyzing information systems outsourcing decision. An IT outsourcing case is used to demonstrate the usefulness of the proposed approach. "Super Decisions" is used to implement the AHP  

    A Secrecy-Preserving Access Control in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Karimi, Leila (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes three challenges; 1) the average number of keys needed to access authorized resources, 2) efficient update of policies, and 3) confidentiality of data owner’s access control policies. Most of the existing proposed solutions address only one of these challenges, while they impose high overhead on both the data owner and users. Such an overhead prevents the model to be implemented in practical applications. In this thesis, we propose an approach to address all the aforementioned challenges with acceptable overhead. In this approach, which is based on selective... 

    Definition of Model For Evaluation of Paint Shops Outsourcing In Car Manufacturing Company

    , M.Sc. Thesis Sharif University of Technology Salehi, Hamid Reza (Author) ; Eshraghniaye Jahromi, Abdolhamid (Supervisor)
    Abstract
    Decreasing cost, enhancing quality, increasing the customer satisfaction and the productivity to gain farther market shares are among the reasons for urging the companies to outsource their needs. In this study the definition of outsourcing, its advantages and weaknesses and the risks associated with it are presented and then models for decision making on outsourcing and its implementation process are discussed. As a scope for this mention, then the evaluation of outsourcing procedures for the paint shops is selected and studied. A model for the case is also presented. The case study is undertaken in Iran Khodro's paint shop during the years: 1379 – 1384 as a practical case. We can summarize... 

    Mutual Operation and Routing Problem Considering Customer Clustering in Cloud Manufacturing

    , M.Sc. Thesis Sharif University of Technology Assari, Mozhgan (Author) ; Fattahi Valilai, Omid (Supervisor)
    Abstract
    Regarding to globalization concept, all companies around the world can communicate with each other, share their technologies and also compensate their production deficiencies. To achieve this goal, cloud manufacturing system have been proposed and investigated. One of the most important issues in cloud manufacturing is focusing on the service composition, in which a composition of cloud services is determined to meet customer demands. Also due to the distribution of the resources in the different points and geographic locations, considering to the production and routing which previously have been studied in the classical space is very important. Considering this, the problem is as follows:... 

    An Optimization Model for Cloud Service Composition and Matching of Mutual Operation and Routing Outsourcing in Cloud Supply Networks

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Mohammad Reza (Author) ; Fatahi, Omid (Supervisor)
    Abstract
    With the development of science and technology and its application in IT (e.g. internet, intranet and URL) the sharing of manufacturing resources reaches higher research attention, where resource virtualization enables new possibilities in terms of collaboration. As a result of these changes, with the intention of sharing optimum allocation of cloud manufacturing resource and capability among service providers and service users, the concept of service composition was introduced. Cloud services can be combine to build virtual manufacturing chain, so a strategy focusing on the evaluation and selection of virtual manufacturing resources to fulfill given services is fundamental exercise to... 

    A new Model for Mutual Logistic and Operation Outsourcing Considering Flexibility in Operation Process Chart (OPC) Selection

    , M.Sc. Thesis Sharif University of Technology Malek, Mahsa (Author) ; Fatahi Valilai, Omid (Supervisor)
    Abstract
    Cloud Manufacturing is a new paradigm which under development and has been introduced as one of the promising models for providing ubiquitous, convenient, on-demand network access to a shared pool of configurable manufacturing resources (e.g, networks, servers, facilities, applications, robots, machines and services) that can be rapidly provisioned with minimal management effort and service provider’s interaction. Cloud Manufacturing is defined based on Cloud Computing. Like the Cloud Computing, Cloud Manufaturing offers a service-oriented architecture that is based on information technology (IT) in which each manufacturing resources is expressed as a service. For providing a... 

    Query Correctness Assurance for Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Noferesti, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were... 

    A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Simin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,... 

    Developing an Integrated Framework for Outsourcing in the Auto Industry

    , M.Sc. Thesis Sharif University of Technology Motamedi, Sadegh (Author) ; Sheikhzadeh, Mehdi (Supervisor)
    Abstract
    Outsourcing is currently a challenging issue in the auto industry. On one hand, outsourcing has be-come a competitive imperative for automakers due to its significant benefits. On the other hand, it involves many aspects of risks that could potentially hurt core competencies of a firm. As such, in the auto industry, it is highly critical to make optimal outsourcing decisions for which an integrated framework offering a holistic view seems quite necessary. In this thesis, based on four fundamental research questions of “Who?”, “What?”, “Whom?” and “How?”, an integrated framework for outsourcing in the auto industry is developed in order to identify effective outsourcing factors and associated... 

    Dynamic Searchable Encryption Schemes

    , M.Sc. Thesis Sharif University of Technology Fareghbal Khameneh, Hamid (Author) ; Khazaei, Shahram (Supervisor) ; Rafiee Karkevandi, Mojtaba (Supervisor)
    Abstract
    Dynamic searchable encryption schemes enable keyword search query and update operations on encrypted data. One of their applications is to use them in cloud storage services that allow the client to store, search and update data on an external server. Due to the importance of efficiency in real-world applications, retrieving information in searchable schemes involves leakage of some information such as search and access patterns. However, with the addition of update operations (insertion and deletion), more leakages are considered for these schemes. In this regard, reducing the amount of information disclosed to the server is necessary. For this purpose, forward and backward security... 

    An Approach for Secure Data Outsourcing

    , Ph.D. Dissertation Sharif University of Technology Hadavi, Mohammad Ali (Author) ; alili, Rasool (Supervisor)
    Abstract
    Data outsourcing is an approach to delegate the burden of data management to external servers. In spite of its clear advantages, data outsourcing requires security assurances including data confidentiality, query result correctness, and access control enforcement. Research proposals have identified solutions with disparate assumptions for different security requirements. It is a real obstacle towards having an integrated solution through the combination of existing approaches. The practicality of data outsourcing to the cloud is seriously affected by this challenge. In this thesis, a unified view based on secret sharing is proposed to simultaneously achieve confidentiality, correctness, and... 

    A verifiable delegated set intersection without pairing

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 2047-2051 ; 9781509059638 (ISBN) Mahdavi Oliaiy, M ; Ameri, M. H ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
    Abstract
    Recently, there has been shown a great interest in the private set intersection (PSI) protocols which are widely used in social networks applications. In a PSI protocol two entities are able to find the intersection of their document set without inferring more information than the common data. In some PSI protocols the process of finding the intersections of the documents are delegated to a third entity like cloud which has high computational and storage resources and the clients can verify the accuracy of the received results. These protocols are known as the Verifiable Delegated Set Intersection (VDSI). In this paper, we proposed an efficient VDSI protocol by employing the El-Gamal... 

    Investment cost optimization for industrial project portfolios using technology mining

    , Article Technological Forecasting and Social Change ; Volume 138 , 2019 , Pages 243-253 ; 00401625 (ISSN) Azimi, S ; Rahmani, R ; Fateh rad, M ; Sharif University of Technology
    Elsevier Inc  2019
    Abstract
    Large technology-intensive enterprises and companies face a constant challenge: How can a set of selected high-tech projects get done in a manner that would minimize the total cost across all projects? In majority of cases, projects are assumed independent, leading to a separate cost evaluation. This assumption often does not hold for real-world project portfolios, frequently sharing overlapping technologies. In this paper, we show how the order of the execution of the projects can directly affect the total cost of the portfolio, due to shared dependencies. Modeling the problems in this area can be achieved by combining two main fields: graph theory and technology mining. A novel method is... 

    A lightweight identity-based provable data possession supporting users’ identity privacy and traceability

    , Article Journal of Information Security and Applications ; Volume 51 , 2020 Rabaninejad, R ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    Cloud storage auditing is considered as a significant service used to verify the integrity of data stored in public cloud. However, most existing auditing protocols suffer form complex certificate management/verification since they rely on expensive Public Key Infrastructure (PKI). On the other hand, most cloud users have constrained computational resources. The few existing ID-based storage auditing protocols in the literature, require resource-constrained users to perform costly operations for generating metadata on file blocks. In this paper, we propose a storage auditing protocol which benefits from ID-based structure and lightweight user computations, simultaneously. Our construction... 

    Towards more secure constructions of adjustable join schemes

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 2 , 2022 , Pages 1078-1089 ; 15455971 (ISSN) Khazaei, S ; Rafiee, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    An adjustable join (AdjoinAdjoin) scheme [4] is a symmetric-key primitive that enables a user to securely outsource his database to a server, and later to issue join queries for a pair of columns. When queries are extended to a list of columns, the 3Partition3Partition security of Adjoin schemes [8] does not capture the expected security. To address this deficiency, we introduce the syntax and security notion of multi-adjustable join (M-AdjoinM-Adjoin) schemes. We propose a new security notion for this purpose, which we refer to as M3PartitionM3Partition. The 3Partition3Partition security of AdjoinAdjoin extends to the M3PartitionM3Partition security of M-AdjoinM-Adjoin in a straightforward... 

    Modeling and solving a capacitated stochastic location-allocation problem using sub-sources

    , Article Soft Computing ; Volume 20, Issue 6 , 2016 , Pages 2261-2280 ; 14327643 (ISSN) Alizadeh, M ; Mahdavi Amiri, N ; Shiripour, S ; Sharif University of Technology
    Springer Verlag 
    Abstract
    We study a capacitated multi-facility location-allocation problem in which the customers have stochastic demands based on Bernoulli distribution function. We consider the capacitated sub-sources of facilities to satisfy demands of customers. In the discrete stochastic problem, the goal is to find optimal locations of facilities among candidate locations and optimal allocations of existing customers to operating facilities so that the total sum of fixed costs of operating facilities, allocation cost of the customers, expected values of servicing and outsourcing costs is minimized. The model is formulated as a mixed-integer nonlinear programming problem. Since finding an optimal solution may... 

    A stochastic programming model for a capacitated location-allocation problem with heterogeneous demands

    , Article Computers and Industrial Engineering ; Volume 137 , 2019 ; 03608352 (ISSN) Alizadeh, M ; Ma, J ; Mahdavi Amiri, N ; Marufuzzaman, M ; Jaradat, R ; Sharif University of Technology
    Elsevier Ltd  2019
    Abstract
    In this paper, we develop a stochastic programming model for the capacitated location-allocation problem in the heterogeneous environment where the demands are distributed according to the Bernoulli function with different probabilities. The capacitated sub-sources of facilities are also involved to satisfy customers’ demands in this work. This study aims to find optimal locations of facilities and optimal allocations of existing customers to the facilities so that the total cost of operating facilities, allocating the customers, expected servicing and outsourcing is minimized. Due to the large amount of customers with different demand probabilities, accurate estimation of the outsourcing... 

    A Secure DBMS Architecture to Preserve Data Privacy, Confidentiality, and Integrity

    , M.Sc. Thesis Sharif University of Technology Halvachi, Hadi (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    While data outsourcing provides some benefits, it suffers from new privacy and security concerns, mainly about the confidentiality and integrity of the stored sensitive data, as well as enforcing access control policies. Current solutions to these aims are not comprehensive and consider only one aspect of security requirements. A secure DBMS architecture is introduced that simultaneously considers confidentiality, integrity and access control enforcement requirements. The transparency of security functions from data owner, service providers, and applications facilitates the operationality of the solution.Additionally, a new indexing technique for character encrypted data is proposed that... 

    Using Functional Encryption to Manage Encrypted Data

    , M.Sc. Thesis Sharif University of Technology Mahfoozi, Rohollah (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Recently, many organizations outsource their data on an external server to rescue the trouble of data maintenance. But, data owners do not trust in the external server to enforce defined access control policies. In recent years, many researches was dedicated to cryptographic access control on outsourced data, in order to solve this problem. We introduce a method based on Attribute-based Encryption to enforce access control on outsourced data. In this method we consider policy updating and administrative access control. As a result The owner is not only able to change access control policies on outsourced data but also to define administrative rights (grant/revoke) for some admin users. Our...