Matching Items (423)
Filtering by

Clear all filters

150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
147853-Thumbnail Image.png
Description

This thesis research aims to define, identify, and promote community theatre as a “third space” for disadvantaged youth. A third space is defined by the Oxford dictionary as “...the in-between, or hybrid, spaces, where the first and second spaces work together to generate a new third space. First and second

This thesis research aims to define, identify, and promote community theatre as a “third space” for disadvantaged youth. A third space is defined by the Oxford dictionary as “...the in-between, or hybrid, spaces, where the first and second spaces work together to generate a new third space. First and second spaces are two different, and possibly conflicting, spatial groupings where people interact physically and socially: such as home (everyday knowledge) and school (academic knowledge)” (Oxford Dictionary, 2021). For disadvantaged youth, the creation of a third space in the theatre can give them a safe environment away from issues they may have at home or at school, it can further their learning about themselves and others, and it can also help those youth feel a sense of belonging to a community larger than themselves. Because of these benefits, it is clear that performing arts programs can offer a great impact on disadvantaged youth; however, many theatre companies struggle to market their programming to said communities. This may be in part, due to low marketing budgets, no specificity in labor resources dedicated to youth programming, or ineffective marketing strategies and tactics.<br/>In order to ideate marketing recommendations for these organizations, primary research was conducted to determine the attitudes and beliefs revolving around youth participation in community theatre, as well as the current marketing strategies and tactics being utilized by programmers. Participants included program managers of youth theatre programs, as well as youth participants from several major cities in the U. S. The secondary research aims to better understand the target demographic (disadvantaged youth), the benefits derived from participation in arts programming, and marketing strategies for the performing arts. Following data analysis are several recommendations for the learning, planning, and implementation of marketing strategies for theatre programmers.

ContributorsNarducci, Emily Nicole (Co-author) / Feuerstein, Kaleigh (Co-author) / Gray, Nancy (Thesis director) / Woodson, Stephani (Committee member) / Department of Marketing (Contributor) / Department of Information Systems (Contributor) / Walter Cronkite School of Journalism and Mass Comm (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147859-Thumbnail Image.png
Description

This thesis research aims to define, identify, and promote community theatre as a “third space” for disadvantaged youth. A third space is defined by the Oxford dictionary as “...the in-between, or hybrid, spaces, where the first and second spaces work together to generate a new third space. First and second

This thesis research aims to define, identify, and promote community theatre as a “third space” for disadvantaged youth. A third space is defined by the Oxford dictionary as “...the in-between, or hybrid, spaces, where the first and second spaces work together to generate a new third space. First and second spaces are two different, and possibly conflicting, spatial groupings where people interact physically and socially: such as home (everyday knowledge) and school (academic knowledge)” (Oxford Dictionary, 2021). For disadvantaged youth, the creation of a third space in the theatre can give them a safe environment away from issues they may have at home or at school, it can further their learning about themselves and others, and it can also help those youth feel a sense of belonging to a community larger than themselves. Because of these benefits, it is clear that performing arts programs can offer a great impact on disadvantaged youth; however, many theatre companies struggle to market their programming to said communities. This may be in part, due to low marketing budgets, no specificity in labor resources dedicated to youth programming, or ineffective marketing strategies and tactics. This research aims to provide tangible recommendations for youth programmers to better involve their target audience.

ContributorsFeuerstein, Kaleigh Nicole (Co-author) / Narducci, Emily (Co-author) / Gray, Nancy (Thesis director) / Woodson, Stephani (Committee member) / Dean, W.P. Carey School of Business (Contributor) / Department of Marketing (Contributor) / Department of Management and Entrepreneurship (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148170-Thumbnail Image.png
Description

Music has consistently been documented as a manner to bring people together across cultures throughout the world. In this research, we propose that people use similar musical taste as a strong sign of potential social connection. To investigate this notion, we draw on literature examining how music merges the public/private

Music has consistently been documented as a manner to bring people together across cultures throughout the world. In this research, we propose that people use similar musical taste as a strong sign of potential social connection. To investigate this notion, we draw on literature examining how music merges the public/private self, the link to personality, and group identity, as well as how it is linked to romantic relationships. Thus, music can be a tool when wanting to get to know someone else and/or forge a platonic relationship. To test this hypothesis, we designed an experiment comparing music relative to another commonality (sharing a sports team in common) to see which factor is stronger in triggering an online social connection. We argue that people believe they have more in common with someone who shares similar music taste compared to other commonalities. We discuss implications for marketers on music streaming platforms.

ContributorsDrambarean, Julianna Rose (Co-author) / Simmons, Logan (Co-author) / Samper, Adriana (Thesis director) / Martin, Nathan (Committee member) / Department of Marketing (Contributor) / Watts College of Public Service & Community Solut (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147816-Thumbnail Image.png
Description

Especially during the current COVID-19 pandemic and age of social unrest in the United States, there has been an increasing need for comfort, yet the idea of comfort is quite vague and rarely elaborated upon. To simplify the idea of comfort and communicate the ideas around it effectively, I am

Especially during the current COVID-19 pandemic and age of social unrest in the United States, there has been an increasing need for comfort, yet the idea of comfort is quite vague and rarely elaborated upon. To simplify the idea of comfort and communicate the ideas around it effectively, I am defining comfort as a subset of escapism in which a person escapes to reduce or alleviate feelings of grief or distress. As companies rush to comfort their customers in this current state of uncertainty, marketers are pressed to identify people’s insecurities and comfort them without coming off as insensitive or trite. Current comfort marketing focuses on inspiring nostalgia in its customers, having them recall previous positive experiences or feelings to comfort them. Nostalgic marketing techniques may ease mild grief in some cases, but using them to alleviate severe distress probably will not be as effective, and has contributed to several seemingly out-of-touch “COVID-19 era” commercials.<br/>When addressing comfort, marketers should understand the type and hierarchy of comfort that they are catering to. Not all comforts are equal, in that some comforts make us feel better than others and some do not comfort us at all. A better understanding of how and why comforts change among different individuals, and possibly being able to predict the comfort preference based on a product or service, will help marketers market their goods and services more effectively. By diversifying and specializing comfort marketing using this hierarchical method, marketers will be able to more significantly reach their customers during “uncertain times.”

ContributorsTarpley, Rachel Michelle (Author) / Eaton, John (Thesis director) / Mokwa, Michael (Committee member) / Department of Management and Entrepreneurship (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148212-Thumbnail Image.png
Description

Developed a business product with a team of CS students.

ContributorsPerri, Cole Thomas (Co-author) / Hernandez, Maximilliano (Co-author) / Schneider, Kaitlin (Co-author) / Call, Andy (Thesis director) / Hunt, Neil (Committee member) / School of Accountancy (Contributor) / Watts College of Public Service & Community Solut (Contributor) / WPC Graduate Programs (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
149803-Thumbnail Image.png
Description
With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.
ContributorsKulkarni, Ketan (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
149851-Thumbnail Image.png
Description
This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute,

This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute, and the code generates results which are sent to the external entity. These results provide the external entity an assurance as to whether the client application and the OS are in pristine condition. This work also presents a technique where it can be verified that the application which was attested, did not get replaced by a different application after completion of the attestation. The implementation of these three techniques was achieved entirely in software and is backward compatible with legacy machines on the Intel x86 architecture. This research also presents two approaches to incorporating software based "root of trust" using Virtual Machine Monitors (VMMs). The first approach determines the integrity of an executing Guest OS from the Host OS using Linux Kernel-based Virtual Machine (KVM) and qemu emulation software. The second approach implements a small VMM called MIvmm that can be utilized as a trusted codebase to build security applications such as those implemented in this research. MIvmm was conceptualized and implemented without using any existing codebase; its minimal size allows it to be trustworthy. Both the VMM approaches leverage processor support for virtualization in the Intel x86 architecture.
ContributorsSrinivasan, Raghunathan (Author) / Dasgupta, Partha (Thesis advisor) / Colbourn, Charles (Committee member) / Shrivastava, Aviral (Committee member) / Huang, Dijiang (Committee member) / Dewan, Prashant (Committee member) / Arizona State University (Publisher)
Created2011
149858-Thumbnail Image.png
Description
This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large,

This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large, linearly increasing ciphertext. The proposed CCP-ABE dramatically reduces the ciphertext to small, constant size. This is the first existing ABE scheme that achieves constant ciphertext size. Also, the proposed CCP-ABE scheme is fully collusion-resistant such that users can not combine their attributes to elevate their decryption capacity. Next step, efficient ABE schemes are applied to construct optimal group communication schemes and broadcast encryption schemes. An attribute based Optimal Group Key (OGK) management scheme that attains communication-storage optimality without collusion vulnerability is presented. Then, a novel broadcast encryption model: Attribute Based Broadcast Encryption (ABBE) is introduced, which exploits the many-to-many nature of attributes to dramatically reduce the storage complexity from linear to logarithm and enable expressive attribute based access policies. The privacy issues are also considered and addressed in ABSS. Firstly, a hidden policy based ABE schemes is proposed to protect receivers' privacy by hiding the access policy. Secondly,a new concept: Gradual Identity Exposure (GIE) is introduced to address the restrictions of hidden policy based ABE schemes. GIE's approach is to reveal the receivers' information gradually by allowing ciphertext recipients to decrypt the message using their possessed attributes one-by-one. If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. Last but not least, ABSS are incorporated into the mobile cloud computing scenarios. In the proposed secure mobile cloud data management framework, the light weight mobile devices can securely outsource expensive ABE operations and data storage to untrusted cloud service providers. The reported scheme includes two components: (1) a Cloud-Assisted Attribute-Based Encryption/Decryption (CA-ABE) scheme and (2) An Attribute-Based Data Storage (ABDS) scheme that achieves information theoretical optimality.
ContributorsZhou, Zhibin (Author) / Huang, Dijiang (Thesis advisor) / Yau, Sik-Sang (Committee member) / Ahn, Gail-Joon (Committee member) / Reisslein, Martin (Committee member) / Arizona State University (Publisher)
Created2011
150148-Thumbnail Image.png
Description
In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and

In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases. The aim of this work is to conceive and design a framework that provides a completely new architecture that 1) can perform fundamental functions that are common and necessary to forensic analyses, and 2) is structured such that it is possible to include collaboration-facilitating components without changing the way users interact with the system sans collaboration. This framework is called the Collaborative Forensic Framework (CUFF). CUFF is constructed from four main components: Cuff Link, Storage, Web Interface, and Analysis Block. With the Cuff Link acting as a mediator between components, CUFF is flexible in both the method of deployment and the technologies used in implementation. The details of a realization of CUFF are given, which uses a combination of Java, the Google Web Toolkit, Django with Apache for a RESTful web service, and an Ubuntu Enterprise Cloud using Eucalyptus. The functionality of CUFF's components is demonstrated by the integration of an acquisition script designed for Android OS-based mobile devices that use the YAFFS2 file system. While this work has obvious application to examination labs which work under the mandate of judicial or investigative bodies, security officers at any organization would benefit from the improved ability to cooperate in electronic discovery efforts and internal investigations.
ContributorsMabey, Michael Kent (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011