ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
- 5 Arizona State University
- 3 Ahn, Gail-Joon
- 3 Ying, Lei
- 3 Zhang, Junshan
- 3 Zhang, Yanchao
- 1 Barbier, Geoffrey
- 1 Chen, Yimin
- more
- 1 Cochran, Douglas
- 1 Collofello, James
- 1 Gong, Xiaowen
- 1 Gundecha, Pritam Sureshlal
- 1 Gupta, Poonam
- 1 Huang, Dijiang
- 1 Liu, Huan
- 1 Reisslein, Martin
- 1 Sun, Jingchao
- 1 Ye, Jieping
- 5 English
- Computer engineering
- Security
- 5 Computer science
- 3 Electrical engineering
- 2 Privacy
- 1 Attacks
- 1 Countermeasures
- more
- 1 Data Mining
- 1 Design
- 1 Engineering
- 1 Information Assurance
- 1 Machine Learning
- 1 Mobile computing
- 1 Mobile device
- 1 Multi-terminal Binary Decision Diagram
- 1 Online Social Network
- 1 Optimization
- 1 Role-Based Access Control
- 1 Security Testing
- 1 Social Awareness
- 1 Social research
- 1 Software Testing
- 1 User Privacy
- 1 User Vulnerability
- 1 Wireless Network
- Dwarf Galaxies as Laboratories of Protogalaxy Physics: Canonical Star Formation Laws at Low Metallicity
- Evolutionary Genetics of CORL Proteins
- Social Skills and Executive Functioning in Children with PCDH-19
- Deep Domain Fusion for Adaptive Image Classification
- Software Defined Pulse-Doppler Radar for Over-The-Air Applications: The Joint Radar-Communications Experiment
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role …
- Contributors
- Gupta, Poonam, Ahn, Gail-Joon, Collofello, James, et al.
- Created Date
- 2014
A principal goal of this dissertation is to study wireless network design and optimization with the focus on two perspectives: 1) socially-aware mobile networking and computing; 2) security and privacy in wireless networking. Under this common theme, this dissertation can be broadly organized into three parts. The first part studies socially-aware mobile networking and computing. First, it studies random access control and power control under a social group utility maximization (SGUM) framework. The socially-aware Nash equilibria (SNEs) are derived and analyzed. Then, it studies mobile crowdsensing under an incentive mechanism that exploits social trust assisted reciprocity (STAR). The efficacy of …
- Contributors
- Gong, Xiaowen, Zhang, Junshan, Cochran, Douglas, et al.
- Created Date
- 2015
Users often join an online social networking (OSN) site, like Facebook, to remain social, by either staying connected with friends or expanding social networks. On an OSN site, users generally share variety of personal information which is often expected to be visible to their friends, but sometimes vulnerable to unwarranted access from others. The recent study suggests that many personal attributes, including religious and political affiliations, sexual orientation, relationship status, age, and gender, are predictable using users' personal data from an OSN site. The majority of users want to remain socially active, and protect their personal data at the same …
- Contributors
- Gundecha, Pritam Sureshlal, Liu, Huan, Ahn, Gail-Joon, et al.
- Created Date
- 2015
Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing. This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, …
- Contributors
- Sun, Jingchao, Zhang, Yanchao, Zhang, Junshan, et al.
- Created Date
- 2017
Mobile devices have penetrated into every aspect of modern world. For one thing, they are becoming ubiquitous in daily life. For the other thing, they are storing more and more data, including sensitive data. Therefore, security and privacy of mobile devices are indispensable. This dissertation consists of five parts: two authentication schemes, two attacks, and one countermeasure related to security and privacy of mobile devices. Specifically, in Chapter 1, I give an overview the challenges and existing solutions in these areas. In Chapter 2, a novel authentication scheme is presented, which is based on a user’s tapping or sliding on …
- Contributors
- Chen, Yimin, Zhang, Yanchao, Zhang, Junshan, et al.
- Created Date
- 2018