This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 66
152195-Thumbnail Image.png
Description
Topological insulators with conducting surface states yet insulating bulk states have generated a lot of interest amongst the physics community due to their varied characteristics and possible applications. Doped topological insulators have presented newer physical states of matter where topological order co&ndashexists; with other physical properties (like magnetic order). The

Topological insulators with conducting surface states yet insulating bulk states have generated a lot of interest amongst the physics community due to their varied characteristics and possible applications. Doped topological insulators have presented newer physical states of matter where topological order co&ndashexists; with other physical properties (like magnetic order). The electronic states of these materials are very intriguing and pose problems and the possible solutions to understanding their unique behaviors. In this work, we use Electron Energy Loss Spectroscopy (EELS) – an analytical TEM tool to study both core&ndashlevel; and valence&ndashlevel; excitations in Bi2Se3 and Cu(doped)Bi2Se3 topological insulators. We use this technique to retrieve information on the valence, bonding nature, co-ordination and lattice site occupancy of the undoped and the doped systems. Using the reference materials Cu(I)Se and Cu(II)Se we try to compare and understand the nature of doping that copper assumes in the lattice. And lastly we utilize the state of the art monochromated Nion UltraSTEM 100 to study electronic/vibrational excitations at a record energy resolution from sub-nm regions in the sample.
ContributorsSubramanian, Ganesh (Author) / Spence, John (Thesis advisor) / Jiang, Nan (Committee member) / Chen, Tingyong (Committee member) / Chan, Candace (Committee member) / Arizona State University (Publisher)
Created2013
151514-Thumbnail Image.png
Description
Dealloying, the selective dissolution of an elemental component from an alloy, is an important corrosion mechanism and a technological significant means to fabricate nanoporous structures for a variety of applications. In noble metal alloys, dealloying proceeds above a composition dependent critical potential, and bi-continuous structure evolves "simultaneously" as a result

Dealloying, the selective dissolution of an elemental component from an alloy, is an important corrosion mechanism and a technological significant means to fabricate nanoporous structures for a variety of applications. In noble metal alloys, dealloying proceeds above a composition dependent critical potential, and bi-continuous structure evolves "simultaneously" as a result of the interplay between percolation dissolution and surface diffusion. In contrast, dealloying in alloys that show considerable solid-state mass transport at ambient temperature is largely unexplored despite its relevance to nanoparticle catalysts and Li-ion anodes. In my dissertation, I discuss the behaviors of two alloy systems in order to elucidate the role of bulk lattice diffusion in dealloying. First, Mg-Cd alloys are chosen to show that when the dealloying is controlled by bulk diffusion, a new type of porosity - negative void dendrites will form, and the process mirrors electrodeposition. Then, Li-Sn alloys are studied with respect to the composition, particle size and dealloying rate effects on the morphology evolution. Under the right condition, dealloying of Li-Sn supported by percolation dissolution results in the same bi-continuous structure as nanoporous noble metals; whereas lattice diffusion through the otherwise "passivated" surface allows for dealloying with no porosity evolution. The interactions between bulk diffusion, surface diffusion and dissolution are revealed by chronopotentiometry and linear sweep voltammetry technics. The better understanding of dealloying from these experiments enables me to construct a brief review summarizing the electrochemistry and morphology aspects of dealloying as well as offering interpretations to new observations such as critical size effect and encased voids in nanoporous gold. At the end of the dissertation, I will describe a preliminary attempt to generalize the morphology evolution "rules of dealloying" to all solid-to-solid interfacial controlled phase transition process, demonstrating that bi-continuous morphologies can evolve regardless of the nature of parent phase.
ContributorsChen, Qing (Author) / Sieradzki, Karl (Thesis advisor) / Friesen, Cody (Committee member) / Buttry, Daniel (Committee member) / Chan, Candace (Committee member) / Arizona State University (Publisher)
Created2013
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152302-Thumbnail Image.png
Description
The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to

The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to achieve greening of the data centers. This thesis deals with cooling energy management in data centers running data-processing frameworks. In particular, we propose ther- mal aware scheduling for MapReduce framework and its Hadoop implementation to reduce cooling energy in data centers. Data-processing frameworks run many low- priority batch processing jobs, such as background log analysis, that do not have strict completion time requirements; they can be delayed by a bounded amount of time. Cooling energy savings are possible by being able to temporally spread the workload, and assign it to the computing equipments which reduce the heat recirculation in data center room and therefore the load on the cooling systems. We implement our scheme in Hadoop and performs some experiments using both CPU-intensive and I/O-intensive workload benchmarks in order to evaluate the efficiency of our scheme. The evaluation results highlight that our thermal aware scheduling reduces hot-spots and makes uniform temperature distribution within the data center possible. Sum- marizing the contribution, we incorporated thermal awareness in Hadoop MapReduce framework by enhancing the native scheduler to make it thermally aware, compare the Thermal Aware Scheduler(TAS) with the Hadoop scheduler (FCFS) by running PageRank and TeraSort benchmarks in the BlueTool data center of Impact lab and show that there is reduction in peak temperature and decrease in cooling power using TAS over FCFS scheduler.
ContributorsKole, Sayan (Author) / Gupta, Sandeep (Thesis advisor) / Huang, Dijiang (Committee member) / Varsamopoulos, Georgios (Committee member) / Arizona State University (Publisher)
Created2013
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
153370-Thumbnail Image.png
Description
Membrane-based gas separation is promising for efficient propylene/propane (C3H6/C3H8) separation with low energy consumption and minimum environment impact. Two microporous inorganic membrane candidates, MFI-type zeolite membrane and carbon molecular sieve membrane (CMS) have demonstrated excellent thermal and chemical stability. Application of these membranes into C3H6/C3H8 separation has not been well

Membrane-based gas separation is promising for efficient propylene/propane (C3H6/C3H8) separation with low energy consumption and minimum environment impact. Two microporous inorganic membrane candidates, MFI-type zeolite membrane and carbon molecular sieve membrane (CMS) have demonstrated excellent thermal and chemical stability. Application of these membranes into C3H6/C3H8 separation has not been well investigated. This dissertation presents fundamental studies on membrane synthesis, characterization and C3H6/C3H8 separation properties of MFI zeolite membrane and CMS membrane.

MFI zeolite membranes were synthesized on α-alumina supports by secondary growth method. Novel positron annihilation spectroscopy (PAS) techniques were used to non-destructively characterize the pore structure of these membranes. PAS reveals a bimodal pore structure consisting of intracrystalline zeolitic micropores of ~0.6 nm in diameter and irregular intercrystalline micropores of 1.4 to 1.8 nm in size for the membranes. The template-free synthesized membrane exhibited a high permeance but a low selectivity in C3H6/C3H8 mixture separation.

CMS membranes were synthesized by coating/pyrolysis method on mesoporous γ-alumina support. Such supports allow coating of thin, high-quality polymer films and subsequent CMS membranes with no infiltration into support pores. The CMS membranes show strong molecular sieving effect, offering a high C3H6/C3H8 mixture selectivity of ~30. Reduction in membrane thickness from 500 nm to 300 nm causes an increase in C3H8 permeance and He/N2 selectivity, but a decrease in the permeance of He, N2 and C3H6 and C3H6/C3H8 selectivity. This can be explained by the thickness dependent chain mobility of the polymer film resulting in final carbon membrane of reduced pore size with different effects on transport of gas of different sizes, including possible closure of C3H6-accessible micropores.

CMS membranes demonstrate excellent C3H6/C3H8 separation performance over a wide range of feed pressure, composition and operation temperature. No plasticization was observed at a feed pressure up to 100 psi. The permeation and separation is mainly controlled by diffusion instead of adsorption. CMS membrane experienced a decline in permeance, and an increase in selectivity over time under on-stream C3H6/C3H8 separation. This aging behavior is due to the reduction in effective pore size and porosity caused by oxygen chemisorption and physical aging of the membrane structure.
ContributorsMa, Xiaoli (Author) / Lin, Jerry (Thesis advisor) / Alford, Terry (Committee member) / Chan, Candace (Committee member) / Arizona State University (Publisher)
Created2015
149851-Thumbnail Image.png
Description
This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute,

This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute, and the code generates results which are sent to the external entity. These results provide the external entity an assurance as to whether the client application and the OS are in pristine condition. This work also presents a technique where it can be verified that the application which was attested, did not get replaced by a different application after completion of the attestation. The implementation of these three techniques was achieved entirely in software and is backward compatible with legacy machines on the Intel x86 architecture. This research also presents two approaches to incorporating software based "root of trust" using Virtual Machine Monitors (VMMs). The first approach determines the integrity of an executing Guest OS from the Host OS using Linux Kernel-based Virtual Machine (KVM) and qemu emulation software. The second approach implements a small VMM called MIvmm that can be utilized as a trusted codebase to build security applications such as those implemented in this research. MIvmm was conceptualized and implemented without using any existing codebase; its minimal size allows it to be trustworthy. Both the VMM approaches leverage processor support for virtualization in the Intel x86 architecture.
ContributorsSrinivasan, Raghunathan (Author) / Dasgupta, Partha (Thesis advisor) / Colbourn, Charles (Committee member) / Shrivastava, Aviral (Committee member) / Huang, Dijiang (Committee member) / Dewan, Prashant (Committee member) / Arizona State University (Publisher)
Created2011
149803-Thumbnail Image.png
Description
With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.
ContributorsKulkarni, Ketan (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
150827-Thumbnail Image.png
Description
In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more

In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more willing to shift their electronic medical record (EMR) systems to clouds that can remove the geographical distance barriers among providers and patient. Even though cloud-based EMRs have received considerable attention since it would help achieve lower operational cost and better interoperability with other healthcare providers, the adoption of security-aware cloud systems has become an extremely important prerequisite for bringing interoperability and efficient management to the healthcare industry. Since a shared electronic health record (EHR) essentially represents a virtualized aggregation of distributed clinical records from multiple healthcare providers, sharing of such integrated EHRs may comply with various authorization policies from these data providers. In this work, we focus on the authorized and selective sharing of EHRs among several parties with different duties and objectives that satisfies access control and compliance issues in healthcare cloud computing environments. We present a secure medical data sharing framework to support selective sharing of composite EHRs aggregated from various healthcare providers and compliance of HIPAA regulations. Our approach also ensures that privacy concerns need to be accommodated for processing access requests to patients' healthcare information. To realize our proposed approach, we design and implement a cloud-based EHRs sharing system. In addition, we describe case studies and evaluation results to demonstrate the effectiveness and efficiency of our approach.
ContributorsWu, Ruoyu (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2012