ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
- Ahn, Gail-Joon
- 63 Arizona State University
- 24 Huang, Dijiang
- 15 Doupé, Adam
- 14 Zhao, Ziming
- 11 Zhang, Yanchao
- 9 Doupe, Adam
- more
- 7 Dasgupta, Partha
- 7 Xue, Guoliang
- 6 Yau, Stephen S
- 5 Syrotiuk, Violet R
- 5 Yau, Sik-Sang
- 4 Davulcu, Hasan
- 4 Lee, Joohyung
- 4 Yau, Stephen S.
- 3 Baral, Chitta
- 3 Bazzi, Rida
- 3 Santanam, Raghu
- 2 Mabey, Michael Kent
- 2 Shakarian, Paulo
- 2 Ye, Jieping
- 2 Ying, Lei
- 2 Zhang, Junshan
- 1 Alshalan, Abdullah O.
- 1 Alshamrani, Adel
- 1 An, Hogeun
- 1 Bapat, Namrata
- 1 Barbier, Geoffrey
- 1 Bazzi, Rida A
- 1 Buduru, Arun Balaji
- 1 Burleson, Winslow
- 1 Candan, Selcuk
- 1 Casolary, Michael
- 1 Chandramouli, Sai Prashanth
- 1 Chung, Chun-Jen
- 1 Colbourn, Charles J
- 1 Collofello, James
- 1 Cooke, Nancy
- 1 Cooke, Nancy J
- 1 Dixit, Vaibhav Hemant
- 1 Dsouza, Clinton Vernon
- 1 Fainekos, Georgios
- 1 Gentz, Reinhard Werner
- 1 Gibson, Aaron Scott
- 1 Guha, Sayantan
- 1 Gundecha, Pritam Sureshlal
- 1 Gupta, Poonam
- 1 Gupta, Saurabh
- 1 Gutierrez, Garrett
- 1 Han, Wonkyu
- 1 Herlihy, Maurice
- 1 Holmes, James Edward
- 1 Hu, Hongxin
- 1 Janssen, Marcus
- 1 Jing, Yiming
- 1 Kadne, Aniruddha Kishor
- 1 Khairnar, Tejas
- 1 Khatkar, Pankaj Kumar
- 1 Kilari, Vishnu Teja
- 1 Kulkarni, Ketan Ashok
- 1 Kyung, Sukwha
- 1 Lanus, Erin
- 1 Li, Bing
- 1 Li, Lingjun
- 1 Lifschitz, Vladimir
- 1 Liu, Huan
- 1 Meng, Yunsong
- 1 Modi, Ajay
- 1 Montgomery, Douglas C
- 1 Mukherjee, Tamalika
- 1 Nagaraja, Vinjith
- 1 Natarajan, Janakarajan
- 1 Nunes, Eric
- 1 Paglierani, Justin
- 1 Panwar, Anupam
- 1 Peisert, Sean
- 1 Pinto, Gerard Lawrence
- 1 Pisharody, Sandeep
- 1 Prabhu Verleker, Ashwin Narayan
- 1 Rajivan, Prashanth
- 1 Reisslein, Martin
- 1 Romo, James Tyler
- 1 Rubio-Medrano, Carlos Ernesto
- 1 Sanchez, Michael
- 1 Santanam, Raghu T
- 1 Scaglione, Anna
- 1 Seo, Jeongjin
- 1 Shoshitaishvili, Yan
- 1 Srivastava, Abhijeet
- 1 Stall Rechia, Felipe
- 1 Sun, Jingchao
- 1 Syrotiuk, Violet
- 1 Taguinod, Marthony
- 1 Tiwari, Naveen
- 1 Todd, Margaret Nicole
- 1 Tsai, Wei-Tek
- 1 Tu, Huahong
- 1 Vincent, Brian W
- 1 Walker, Erin
- 1 Whitaker, Jeremy Andrew
- 63 Public
- 57 Computer science
- 14 Security
- 6 Cloud Computing
- 6 Computer Science
- 6 Computer engineering
- 5 Privacy
- 4 Machine Learning
- more
- 3 Electrical engineering
- 3 Information technology
- 2 Android
- 2 Artificial Intelligence
- 2 Attack
- 2 Attribute
- 2 Information Assurance
- 2 Network Security
- 2 Ontology
- 2 OpenFlow
- 2 Policy Management
- 2 SDN
- 2 Software Defined Networking
- 2 digital forensics
- 2 forensic framework
- 2 probabilistic human behaviors
- 2 probabilistic reasoning
- 1 Access Control
- 1 Access control
- 1 Access control model
- 1 Access control policy
- 1 Acquisition
- 1 Adaptation
- 1 Adaptive Compression
- 1 Advanced Persistent Threats
- 1 Agent Based Model
- 1 Analysis
- 1 Android forensics
- 1 Anomaly Detection
- 1 Anonymity
- 1 Answer Set Programming
- 1 Artificial intelligence
- 1 Attack Graph
- 1 Attacks
- 1 Attribute Based Access Control
- 1 Attribute Based Encryption
- 1 Automated Source Code Randomization
- 1 Black-Box
- 1 CNN
- 1 Chrome OS
- 1 Cloud Security
- 1 Cognitive Bias
- 1 Cognitive Radios Networks
- 1 Cognitive models
- 1 Cognitive psychology
- 1 Collaborations
- 1 Common Information Model
- 1 Computer Science and Engineering
- 1 Computer and Network Security
- 1 Confidence Score
- 1 Confidentiality
- 1 Conflicts
- 1 Continuous Monitoring
- 1 Critical cloud infrastructures
- 1 Cross Site Scripting
- 1 Cyber Attacks
- 1 Cyber Forensics
- 1 Cyber Security
- 1 Cyber security
- 1 Cybersecurity
- 1 Data Analysis
- 1 Data Mining
- 1 Data Protection
- 1 Decentralized
- 1 Defeasible logic programming
- 1 Defense
- 1 Derivation
- 1 Digital forensics
- 1 Distributed Environments
- 1 Dynamic Configurations
- 1 E-Mail Header Injection
- 1 E-Mail Injection
- 1 EHR
- 1 Edge Network Computing
- 1 Email
- 1 Engineering
- 1 Evidence Representation
- 1 Fallback Authentication
- 1 Federation
- 1 Flexible Viewpoint
- 1 Forensics
- 1 Framework for Integration
- 1 Gossiping
- 1 Graph
- 1 Graph Propagation
- 1 Group Communication
- 1 HIPAA
- 1 Hardware-assisted security
- 1 Header Injection
- 1 Healthcare
- 1 Hierarchical Edge Bundle
- 1 Honeynet
- 1 Identity
- Dwarf Galaxies as Laboratories of Protogalaxy Physics: Canonical Star Formation Laws at Low Metallicity
- Evolutionary Genetics of CORL Proteins
- Social Skills and Executive Functioning in Children with PCDH-19
- Deep Domain Fusion for Adaptive Image Classification
- Software Defined Pulse-Doppler Radar for Over-The-Air Applications: The Joint Radar-Communications Experiment
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable application developers and have gained popularity over the past few years. However, most cloud computing systems in operation today are proprietary and rely upon infrastructure that is invisible to the research community, or are not explicitly designed to be instrumented and modified by systems researchers. In this research, Xen Server Management API is employed to build a …
- Contributors
- Kadne, Aniruddha Kishor, Huang, Dijiang, Tsai, Wei-Tek, et al.
- Created Date
- 2010
With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing …
- Contributors
- Kulkarni, Ketan Ashok, Ahn, Gail-Joon, Yau, Stephen S, et al.
- Created Date
- 2011
This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large, linearly increasing ciphertext. The proposed CCP-ABE dramatically reduces the ciphertext to small, constant size. This is the first existing ABE scheme that achieves constant ciphertext size. Also, the proposed CCP-ABE scheme is fully collusion-resistant such that users can not combine their attributes to elevate their decryption capacity. Next step, efficient …
- Contributors
- Zhou, Zhibin, Huang, Dijiang, Yau, Sik-Sang, et al.
- Created Date
- 2011
Action language C+ is a formalism for describing properties of actions, which is based on nonmonotonic causal logic. The definite fragment of C+ is implemented in the Causal Calculator (CCalc), which is based on the reduction of nonmonotonic causal logic to propositional logic. This thesis describes the language of CCalc in terms of answer set programming (ASP), based on the translation of nonmonotonic causal logic to formulas under the stable model semantics. I designed a standard library which describes the constructs of the input language of CCalc in terms of ASP, allowing a simple modular method to represent CCalc input …
- Contributors
- Casolary, Michael, Lee, Joohyung, Ahn, Gail-Joon, et al.
- Created Date
- 2011
In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases. The aim of this work is to conceive and design a framework that provides a completely new architecture that 1) can perform fundamental functions …
- Contributors
- Mabey, Michael Kent, Ahn, Gail-Joon, Yau, Stephen S, et al.
- Created Date
- 2011
In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more willing to shift their electronic medical record (EMR) systems to clouds that can remove the geographical distance barriers among providers and patient. Even though cloud-based EMRs have received considerable attention since it would help achieve lower operational cost and better interoperability with other healthcare providers, the adoption of security-aware cloud …
- Contributors
- Wu, Ruoyu, Ahn, Gail-Joon, Yau, Stephen S., et al.
- Created Date
- 2012
Cognitive Radios (CR) are designed to dynamically reconfigure their transmission and/or reception parameters to utilize the bandwidth efficiently. With a rapidly fluctuating radio environment, spectrum management becomes crucial for cognitive radios. In a Cognitive Radio Ad Hoc Network (CRAHN) setting, the sensing and transmission times of the cognitive radio play a more important role because of the decentralized nature of the network. They have a direct impact on the throughput. Due to the tradeoff between throughput and the sensing time, finding optimal values for sensing time and transmission time is difficult. In this thesis, a method is proposed to improve …
- Contributors
- Bapat, Namrata, Syrotiuk, Violet R, Ahn, Gail-Joon, et al.
- Created Date
- 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an …
- Contributors
- An, Hogeun, Yau, Sik-Sang, Huang, Dijiang, et al.
- Created Date
- 2012
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates …
- Contributors
- Hu, Hongxin, Ahn, Gail-Joon, Yau, Stephen S., et al.
- Created Date
- 2012
Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling language in order to enhance expressivity, such as incorporating aggregates and interfaces with ontologies. Also, in order to overcome the grounding bottleneck of computation in ASP, there are increasing interests in integrating ASP with other computing paradigms, such as Constraint Programming (CP) and Satisfiability Modulo Theories (SMT). Due to the …
- Contributors
- Meng, Yunsong, Lee, Joohyung, Ahn, Gail-Joon, et al.
- Created Date
- 2013