This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 210
Filtering by

Clear all filters

152134-Thumbnail Image.png
Description
Bright Summer, a one-movement piece for orchestra, was composed in Arizona, and completed in February 2013. The piece is approximately twelve minutes long. The motivation for writing this piece was the death of my mother the year before, in 2012. The prevailing mood of this work is bright and pleasant,

Bright Summer, a one-movement piece for orchestra, was composed in Arizona, and completed in February 2013. The piece is approximately twelve minutes long. The motivation for writing this piece was the death of my mother the year before, in 2012. The prevailing mood of this work is bright and pleasant, expressing my mother's cheerful personality when she was alive. It also portrays bright summer days which resemble my mother's spirit. Thus, soundscape plays an important role in this work. It depicts summer breeze, rustling sounds of leaves, and, to translate a Korean saying, "high blue skies." This soundscape opens the piece as well as closes it. In the middle section, the fast upbeat themes represent my mother's witty and optimistic personality. The piece also contains the presence of a hymn tune, The Love of God is Greater Far, which informs the motivic content and also functions as the climax of the piece. It was my mother's favorite hymn and we used to sing it together following her conversion to Christianity. The piece contains three main sections, which are held together by transitional material based on the soundscape and metric modulations. Unlike my earlier works, Bright Summer is tonal, with upper tertian harmonies prevailing throughout the piece. However, the opening and closing soundscapes do not have functional harmonies. For example, tertian chords appear and vanish silently, leaving behind some resonant sounds without any harmonic progression. Overall, the whole piece is reminiscent of my mother who lived a beautiful life.
ContributorsKim, JeeYeon (Composer) / DeMars, James (Thesis advisor) / Hackbarth, Glenn (Committee member) / Rogers, Rodney (Committee member) / Levy, Benjamin (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2013
151773-Thumbnail Image.png
Description
Norwegian composer Ola Gjeilo (b. 1978) is highly regarded as an accomplished and prolific composer of choral music. His creative output includes works for chorus, solo piano, and wind symphony. His unique style infuses elements of cinematic music, jazz and improvisation, with particularly intriguing selections of text. This study examines

Norwegian composer Ola Gjeilo (b. 1978) is highly regarded as an accomplished and prolific composer of choral music. His creative output includes works for chorus, solo piano, and wind symphony. His unique style infuses elements of cinematic music, jazz and improvisation, with particularly intriguing selections of text. This study examines the factors that influence Gjeilo's compositional techniques, and the musical interpretations of conductor Charles Bruffy in his preparation for The Phoenix Chorale's recording Northern Lights: Choral Works by Ola Gjeilo. The eleven works discussed in this study are: The Ground, Evening Prayer, Ubi caritas, Prelude, Northern Lights, The Spheres, Tota pulchra es, Serenity, Phoenix (Agnus Dei), Unicornis captivatur, and Dark Night of the Soul. As a relatively new and young composer, there is very little published literature on Gjeilo and his works. This study provides an intimate glance into the creative process of the composer. By composing in multiple styles and with a variety of inspirational sources, Gjeilo creates a fresh approach toward composition of new choral music. His style is revealed through interviews and numerous collaborations with conductors and performers who have prepared and performed his music, as well through an examination of the eleven works recorded by The Phoenix Chorale.
ContributorsGarrison, Ryan Derrick (Author) / Reber, William (Thesis advisor) / Saucier, Catherine (Committee member) / Rockmaker, Jody (Committee member) / Doan, Jerry (Committee member) / Arizona State University (Publisher)
Created2013
151653-Thumbnail Image.png
Description
Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling

Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling language in order to enhance expressivity, such as incorporating aggregates and interfaces with ontologies. Also, in order to overcome the grounding bottleneck of computation in ASP, there are increasing interests in integrating ASP with other computing paradigms, such as Constraint Programming (CP) and Satisfiability Modulo Theories (SMT). Due to the non-monotonic nature of the ASP semantics, such enhancements turned out to be non-trivial and the existing extensions are not fully satisfactory. We observe that one main reason for the difficulties rooted in the propositional semantics of ASP, which is limited in handling first-order constructs (such as aggregates and ontologies) and functions (such as constraint variables in CP and SMT) in natural ways. This dissertation presents a unifying view on these extensions by viewing them as instances of formulas with generalized quantifiers and intensional functions. We extend the first-order stable model semantics by by Ferraris, Lee, and Lifschitz to allow generalized quantifiers, which cover aggregate, DL-atoms, constraints and SMT theory atoms as special cases. Using this unifying framework, we study and relate different extensions of ASP. We also present a tight integration of ASP with SMT, based on which we enhance action language C+ to handle reasoning about continuous changes. Our framework yields a systematic approach to study and extend non-monotonic languages.
ContributorsMeng, Yunsong (Author) / Lee, Joohyung (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Baral, Chitta (Committee member) / Fainekos, Georgios (Committee member) / Lifschitz, Vladimir (Committee member) / Arizona State University (Publisher)
Created2013
151610-Thumbnail Image.png
Description
This thesis presents a new arrangement of Richard Peaslee's trombone solo "Arrows of Time" for brass band. This arrangement adapts Peaslee's orchestration - and subsequent arrangement by Dr. Joshua Hauser for wind ensemble - for the modern brass band instrumentation and includes a full score. A brief biography of Richard

This thesis presents a new arrangement of Richard Peaslee's trombone solo "Arrows of Time" for brass band. This arrangement adapts Peaslee's orchestration - and subsequent arrangement by Dr. Joshua Hauser for wind ensemble - for the modern brass band instrumentation and includes a full score. A brief biography of Richard Peaslee and his work accompanies this new arrangement, along with commentary on the orchestration of "Arrows of Time", and discussion of the evolution and adaptation of the work for wind ensemble by Dr. Hauser. The methodology used to adapt these versions for the brass band completes the background information.
ContributorsMalloy, Jason Patrick (Author) / Ericson, John (Thesis advisor) / Oldani, Robert (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2013
152405-Thumbnail Image.png
Description
The German pianist and composer Johannes Brahms (1883-1897) wrote more than 122 works for a wide variety of ensembles and genres. Despite this remarkable productivity, and his widely heralded talent for innovation and technique as a composer, few of his works have been arranged for solo guitar, and these have

The German pianist and composer Johannes Brahms (1883-1897) wrote more than 122 works for a wide variety of ensembles and genres. Despite this remarkable productivity, and his widely heralded talent for innovation and technique as a composer, few of his works have been arranged for solo guitar, and these have focused primarily on his simpler, more melodic works. Conventional wisdom is that his music is "too dense" to be played on the guitar. As a result, there are no arrangements of orchestral works by Brahms in the standard repertoire for the guitar. In arranging Brahms's Serenade in D Major, movt. 1 for the guitar, I provide a counter argument that not all of Brahms's orchestral music is too dense all of the time. In Part I, I provide a brief overview of the history of, and sources for, the Serenade. Part II describes a step-by-step guide through the process of arranging orchestral repertoire for the solo guitar. Part III is an examination of the editing process that utilizes examples from the guitar arrangement of the Serenade in order to illustrate the various techniques and considerations that are part of the editing process. Part IV is a performance edition of the arrangement. In summary, the present arrangement of Brahms's Serenade, op.11 is the beginning of a conversation about why the "guitar world" should be incorporating the music of Brahms into the standard repertoire. The lessons learned, and the technical challenges discovered, should help inform future arrangers and guitar performers for additional compositions by Brahms.
ContributorsLanier, William Hudson (Author) / Koonce, Frank (Thesis advisor) / Micklich, Albie (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2013
152422-Thumbnail Image.png
Description
With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may

With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may lead adversaries to access critical information by circumventing security practices. In order to ensure security, considerable efforts have been spent to develop security regulations by facilitating security best-practices. Applying shared security standards to the system is critical to understand vulnerabilities and prevent well-known threats from exploiting vulnerabilities. However, many end users tend to change configurations of their systems without paying attention to the security. Hence, it is not straightforward to protect systems from being changed by unconscious users in a timely manner. Detecting the installation of harmful applications is not sufficient since attackers may exploit risky software as well as commonly used software. In addition, checking the assurance of security configurations periodically is disadvantageous in terms of time and cost due to zero-day attacks and the timing attacks that can leverage the window between each security checks. Therefore, event-driven monitoring approach is critical to continuously assess security of a target system without ignoring a particular window between security checks and lessen the burden of exhausted task to inspect the entire configurations in the system. Furthermore, the system should be able to generate a vulnerability report for any change initiated by a user if such changes refer to the requirements in the standards and turn out to be vulnerable. Assessing various systems in distributed environments also requires to consistently applying standards to each environment. Such a uniformed consistent assessment is important because the way of assessment approach for detecting security vulnerabilities may vary across applications and operating systems. In this thesis, I introduce an automated event-driven security assessment framework to overcome and accommodate the aforementioned issues. I also discuss the implementation details that are based on the commercial-off-the-self technologies and testbed being established to evaluate approach. Besides, I describe evaluation results that demonstrate the effectiveness and practicality of the approaches.
ContributorsSeo, Jeong-Jin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Lee, Joohyung (Committee member) / Arizona State University (Publisher)
Created2014
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152555-Thumbnail Image.png
Description
Nelson Rolihlahla Mandela was born July 18, 1918 into the Madiba clan in Mvezo, Transkei, South Africa. Mandela was a lawyer by trade and a freedom fighter who envisioned freedom and equality for all South Africans regardless of race. In 1965, Mandela was imprisoned at Robben Island for twenty-seven years

Nelson Rolihlahla Mandela was born July 18, 1918 into the Madiba clan in Mvezo, Transkei, South Africa. Mandela was a lawyer by trade and a freedom fighter who envisioned freedom and equality for all South Africans regardless of race. In 1965, Mandela was imprisoned at Robben Island for twenty-seven years for treason and terrorist activities against the South African apartheid regime: he was assigned prison numbers 46664. In 1992, Mandela was released from prison and two years later not only became the first democratically elected president of South Africa, but also its first black president. "Madiba 46664" is an eight-minute chamber work scored for flute, oboe, clarinet in B-flat, and bassoon; vibraphone, and two percussionists; piano; violins, violas, and celli. The work blends traditional South African rhythms of the drumming culture with elements of Western harmony and form in contrasting textures of homophony, polyphony and antiphony. "Madiba 46664" utilizes Mandela's prison number, birthdate and age (at the time the composition process began in 2013) for the initial generation of meter, rhythm, harmony, melody, and form. The work also shares intercultural concepts that can be seen in the works of three contemporary African composers, South Africans Jeanne Zaidel-Rudolph and Andile Khumalo, and Nigerian Ayo Oluranti. Each section represents a period of Mandela's life as a freedom fighter, a prisoner, and a president. The inspiration stems from the composer's discussions with Mandela soon after his release from prison and prior to his presidency. These lively discussions pertained to the state of traditional music in then apartheid South Africa and led to this creation. The conversations also played a role in the creative process.
ContributorsMabingnai, Collette Sipho (Composer) / DeMars, James (Thesis advisor) / Hackbarth, Glenn (Committee member) / Humphreys, Jere (Committee member) / Rockmaker, Jody (Committee member) / Rogers, Rodney (Committee member) / Arizona State University (Publisher)
Created2014
152278-Thumbnail Image.png
Description
The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool in the commission of crime. Current forensic practices focus mostly on that of disk forensics, while email forensics is left as an analysis task stemming from that practice. As there

The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool in the commission of crime. Current forensic practices focus mostly on that of disk forensics, while email forensics is left as an analysis task stemming from that practice. As there is no well-defined process to be used for email forensics the comprehensiveness, extensibility of tools, uniformity of evidence, usefulness in collaborative/distributed environments, and consistency of investigations are hindered. At present, there exists little support for discovering, acquiring, and representing web-based email, despite its widespread use. To remedy this, a systematic process which includes discovering, acquiring, and representing web-based email for email forensics which is integrated into the normal forensic analysis workflow, and which accommodates the distinct characteristics of email evidence will be presented. This process focuses on detecting the presence of non-obvious artifacts related to email accounts, retrieving the data from the service provider, and representing email in a well-structured format based on existing standards. As a result, developers and organizations can collaboratively create and use analysis tools that can analyze email evidence from any source in the same fashion and the examiner can access additional data relevant to their forensic cases. Following, an extensible framework implementing this novel process-driven approach has been implemented in an attempt to address the problems of comprehensiveness, extensibility, uniformity, collaboration/distribution, and consistency within forensic investigations involving email evidence.
ContributorsPaglierani, Justin W (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Santanam, Raghu T (Committee member) / Arizona State University (Publisher)
Created2013
152495-Thumbnail Image.png
Description
Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server

Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server to enforce access policies on the data, services and other such resources fairly easily. It also accommodates new policies and changes to existing policies gracefully, thereby making it a potentially good mechanism for implementing access control in large systems, particularly in today's age of Cloud Computing. However management of the attributes in ABAC environment is an area that has been little touched upon. Having a mechanism to allow multiple ABAC based systems to share data and resources can go a long way in making ABAC scalable. At the same time each system should be able to specify their own attribute sets independently. In the research presented in this document a new mechanism is proposed that would enable users to share resources and data in a cloud environment using ABAC techniques in a distributed manner. The focus is mainly on decentralizing the access policy specifications for the shared data so that each data owner can specify the access policy independent of others. The concept of ontologies and semantic web is introduced in the ABAC paradigm that would help in giving a scalable structure to the attributes and also allow systems having different sets of attributes to communicate and share resources.
ContributorsPrabhu Verleker, Ashwin Narayan (Author) / Huang, Dijiang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014