Matching Items (10)
Filtering by

Clear all filters

134157-Thumbnail Image.png
Description
This paper details the specification and implementation of a single-machine blockchain simulator. It also includes a brief introduction on the history & underlying concepts of blockchain, with explanations on features such as decentralization, openness, trustlessness, and consensus. The introduction features a brief overview of public interest and current implementations of

This paper details the specification and implementation of a single-machine blockchain simulator. It also includes a brief introduction on the history & underlying concepts of blockchain, with explanations on features such as decentralization, openness, trustlessness, and consensus. The introduction features a brief overview of public interest and current implementations of blockchain before stating potential use cases for blockchain simulation software. The paper then gives a brief literature review of blockchain's role, both as a disruptive technology and a foundational technology. The literature review also addresses the potential and difficulties regarding the use of blockchain in Internet of Things (IoT) networks, and also describes the limitations of blockchain in general regarding computational intensity, storage capacity, and network architecture. Next, the paper gives the specification for a generic blockchain structure, with summaries on the behaviors and purposes of transactions, blocks, nodes, miners, public & private key cryptography, signature validation, and hashing. Finally, the author gives an overview of their specific implementation of the blockchain using C/C++ and OpenSSL. The overview includes a brief description of all the classes and data structures involved in the implementation, including their function and behavior. While the implementation meets the requirements set forward in the specification, the results are more qualitative and intuitive, as time constraints did not allow for quantitative measurements of the network simulation. The paper concludes by discussing potential applications for the simulator, and the possibility for future hardware implementations of blockchain.
ContributorsRauschenbach, Timothy Rex (Author) / Vrudhula, Sarma (Thesis director) / Nakamura, Mutsumi (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12
133162-Thumbnail Image.png
Description
Executive compensation is broken into two parts: one fixed and one variable. The fixed component of executive compensation is the annual salary and the variable components are performance-based incentives. Clawback provisions of executive compensation are designed to require executives to return performance-based, variable compensation that was erroneously awarded in the

Executive compensation is broken into two parts: one fixed and one variable. The fixed component of executive compensation is the annual salary and the variable components are performance-based incentives. Clawback provisions of executive compensation are designed to require executives to return performance-based, variable compensation that was erroneously awarded in the year of a misstatement. This research shows the need for the use of a new clawback provision that combines aspects of the two currently in regulation. In our current federal regulation, there are two clawback provisions in play: Section 304 of Sarbanes-Oxley and section 954 of The Dodd\u2014Frank Wall Street Reform and Consumer Protection Act. This paper argues for the use of an optimal clawback provision that combines aspects of both the current SOX provision and the Dodd-Frank provision, by integrating the principles of loss aversion and narcissism. These two factors are important to consider when designing a clawback provision, as it is generally accepted that average individuals are loss averse and executives are becoming increasingly narcissistic. Therefore, when attempting to mitigate the risk of a leader keeping erroneously awarded executive compensation, the decision making factors of narcissism and loss aversion must be taken into account. Additionally, this paper predicts how compensation structures will shift post-implementation. Through a survey analyzing the level of both loss- aversion and narcissism in respondents, the research question justifies the principle that people are loss averse and that a subset of the population show narcissistic tendencies. Both loss aversion and narcissism drove the results to suggest there are benefits to both clawback provisions and that a new provision that combines elements of both is most beneficial in mitigating the risk of executives receiving erroneously awarded compensation. I concluded the most optimal clawback provision is mandatory for all public companies (Dodd-Frank), targets all executives (Dodd-Frank), and requires the recuperation of the entire bonus, not just that which was in excess of what should have been received (SOX).
ContributorsLarscheid, Elizabeth (Author) / Samuelson, Melissa (Thesis director) / Casas-Arce, Pablo (Committee member) / WPC Graduate Programs (Contributor) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2018-12
132930-Thumbnail Image.png
Description
The explosive Web growth in the last decade has drastically changed the way billions of people all around the globe conduct numerous activities including creating, sharing, and consuming information. The massive amount of user-generated information encourages companies and service providers to collect users' information and use it in order to

The explosive Web growth in the last decade has drastically changed the way billions of people all around the globe conduct numerous activities including creating, sharing, and consuming information. The massive amount of user-generated information encourages companies and service providers to collect users' information and use it in order to better their own goals and then further provide personalized services to users as well. However, the users' information contains their private and sensitive information and can lead to breach of users' privacy. Anonymizing users' information before publishing and using such data is vital in securing their privacy. Due to the many forms of user information (e.g., structural, interactions, etc), different techniques are required for anonymization of users' data. In this thesis, first we discuss different anonymization techniques for various types of user-generated data, i.e., network graphs, web browsing history, and user-item interactions. Our experimental results show the effectiveness of such techniques for data anonymization. Then, we briefly touch on securely and privately sharing information through blockchains.
ContributorsNou, Alex Sheavin (Author) / Liu, Huan (Thesis director) / Beigi, Ghazaleh (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
133137-Thumbnail Image.png
Description
Third-party mixers are used to heighten the anonymity of Bitcoin users. The mixing techniques implemented by these tools are often untraceable on the blockchain, making them appealing to money launderers. This research aims to analyze mixers currently available on the deep web. In addition, an in-depth case study is done

Third-party mixers are used to heighten the anonymity of Bitcoin users. The mixing techniques implemented by these tools are often untraceable on the blockchain, making them appealing to money launderers. This research aims to analyze mixers currently available on the deep web. In addition, an in-depth case study is done on an open-source bitcoin mixer known as Penguin Mixer. A local version of Penguin Mixer was used to visualize mixer behavior under specific scenarios. This study could lead to the identification of vulnerabilities in mixing tools and detection of these tools on the blockchain.
ContributorsPakki, Jaswant (Author) / Doupe, Adam (Thesis director) / Shoshitaishvili, Yan (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2018-12
133077-Thumbnail Image.png
Description
Blockchain is a sophisticated and complex technology that will have a massive impact on the public accounting industry. Currently there is concern surrounding how blockchain may impact the industry as a whole. Auditors and accountants are worried that this technology has the potential to replace the responsibilities they fulfill. However,

Blockchain is a sophisticated and complex technology that will have a massive impact on the public accounting industry. Currently there is concern surrounding how blockchain may impact the industry as a whole. Auditors and accountants are worried that this technology has the potential to replace the responsibilities they fulfill. However, blockchain technology will not replace accountants and will enhance their daily activities by eliminating menial tasks, providing increased transparency, and allowing time to be spent in areas that require more consideration. This will change the role of accountants and professionals, requiring them to be more technologically proficient and analytically minded. This paper is organized as follows. There will be an initial explanation of the technology to inform the reader of what blockchain is and how it works. Then there will be a discussion regarding how blockchain technology relates to, and can be utilized by, public accounting firms as well as the implications of blockchain on the public accounting industry. These implications will be discussed followed by why they are extraneous, and how to combat them in both the assurance and advisory practices. In conclusion, recommendations will be provided for public accounting firms on how to effectively utilize the technology to their benefit.
ContributorsLomsdalen, Stephen A (Co-author) / Charen, Stephanie (Co-author) / Samuelson, Melissa (Thesis director) / Garverick, Michael (Committee member) / School of Accountancy (Contributor) / WPC Graduate Programs (Contributor) / Barrett, The Honors College (Contributor)
Created2018-12
134933-Thumbnail Image.png
Description
Given its impact on the accounting profession and public corporations, Sarbanes-Oxley Act of 2002(SOX) is a widely researched regulation among accounting scholars. Research typically focuses on the impact it has had on corporations, executives and auditors, however, there is limited research that illustrates the impact SOX may have on average

Given its impact on the accounting profession and public corporations, Sarbanes-Oxley Act of 2002(SOX) is a widely researched regulation among accounting scholars. Research typically focuses on the impact it has had on corporations, executives and auditors, however, there is limited research that illustrates the impact SOX may have on average Americans. There were several US criminal code sections that resulted from the passing of SOX. Statute 1519, which is often referred to as the "anti-shredding provision", penalizes anyone who "knowingly alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to" obstruct a current or foreseeable federal investigation. This statute, although intended to punish behavior similar to that which occurred in the early 2000s by corporations and auditors, has been used to charge people beyond its original intent. Several issues with the crafting of the statute cause its broad application and some litigation even reached the Supreme Court due to its vague wording. Not only is the statute being applied beyond the intent, there are other issues that legal scholars have critiqued it for. This statute is far from being the only law facing these issues as the same issues and critiques are found in the 14th amendment. Rewriting the statute seems to be the most effective way to address the concerns of judges, lawyers and defendants regarding the statute. In addition, Congress could have passed this statute outside of SOX to avoid being seen as overreaching if obstruction of justice related to documents was actually an issue outside of corporate fraud.
ContributorsGonzalez, Joana (Author) / Samuelson, Melissa (Thesis director) / Lowe, Jordan (Committee member) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
Description

Through my work with the Arizona State University Blockchain Research Lab (BRL) and JennyCo, one of the first Healthcare Information (HCI) HIPAA - compliant decentralized exchanges, I have had the opportunity to explore a unique cross-section of some of the most up and coming DLTs including both DAGs and blockchains.

Through my work with the Arizona State University Blockchain Research Lab (BRL) and JennyCo, one of the first Healthcare Information (HCI) HIPAA - compliant decentralized exchanges, I have had the opportunity to explore a unique cross-section of some of the most up and coming DLTs including both DAGs and blockchains. During this research, four major technologies (including JennyCo’s own systems) presented themselves as prime candidates for the comparative analysis of two models for implementing JennyCo’s system architecture for the monetization of healthcare information exchanges (HIEs). These four identified technologies and their underlying mechanisms will be explored thoroughly throughout the course of this paper and are listed with brief definitions as follows: Polygon - “Polygon is a “layer two” or “sidechain” scaling solution that runs alongside the Ethereum blockchain. MATIC is the network’s native cryptocurrency, which is used for fees, staking, and more” [8]. Polygon is the scalable layer involved in the L2SP architecture. Ethereum - “Ethereum is a decentralized blockchain platform that establishes a peer-to-peer network that securely executes and verifies application code, called smart contracts.” [9] This foundational Layer-1 runs thousands of nodes and creates a unique decentralized ecosystem governed by turing complete automated programs. Ethereum is the foundational Layer involved in the L2SP. Constellation - A novel Layer-0 data-centric peer-to-peer network that utilizes the “Hypergraph Transfer Protocol or HGTP, a DLT known as a [DAG] protocol with a novel reputation-based consensus model called Proof of Reputable Observation (PRO). Hypergraph is a feeless decentralized network that supports the transfer of $DAG cryptocurrency.” [10] JennyCo Protocol - Acts as a HIPAA compliant decentralized HIE by allowing consumers, big businesses, and brands to access and exchange user health data on a secure, interoperable, and accessible platform via DLT. The JennyCo Protocol implements utility tokens to reward buyers and sellers for exchanging data. Its protocol nature comes from its DLT implementation which governs the functioning of on-chain actions (e.g. smart contracts). In this case, these actions consist of secure and transparent health data exchange and monetization to reconstitute data ownership to those who generate that data [11]. With the direct experience of working closely with multiple companies behind the technologies listed, I have been exposed to the benefits and deficits of each of these technologies and their corresponding approaches. In this paper, I will use my experience with these technologies and their frameworks to explore two distributed ledger architecture protocols in order to determine the more effective model for implementing JennycCo’s health data exchange. I will begin this paper with an exploration of blockchain and directed acyclic graph (DAG) technologies to better understand their innate architectures and features. I will then move to an in-depth look at layered protocols, and healthcare data in the form of EHRs. Additionally, I will address the main challenges EHRs and HIEs face to present a deeper understanding of the challenges JennyCo is attempting to address. Finally, I will demonstrate my hypothesis: the Hypergraph Transfer Protocol (HGTP) model by Constellation presents significant advantages in scalability, interoperability, and external data security over the Layer-2 Scalability Protocol (L2SP) used by Polygon and Ethereum in implementing the JennyCo protocol. This will be done through a thorough breakdown of each protocol along with an analysis of relevant criteria including but not limited to: security, interoperability, and scalability. In doing so, I hope to determine the best framework for running JennyCo’s HIE Protocol.

ContributorsVan Bussum, Alexander (Author) / Boscovic, Dragan (Thesis director) / Grando, Adela (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-05
131060-Thumbnail Image.png
Description
All modern multiplayer games are administered by having players connect to a remote server which is used to provide the ground truth for game state and player actions. This use of a central server provides a simple and intuitive way to administer game servers but also provides a single point

All modern multiplayer games are administered by having players connect to a remote server which is used to provide the ground truth for game state and player actions. This use of a central server provides a simple and intuitive way to administer game servers but also provides a single point of failure, as each server must be able to process all actions coming in and make a decision on whether the action is allowed or not, and how to update the game state accordingly. In cases where the server is under significant load, either from a very popular game release or from a deliberate attack, the game slows down or completely crashes. When there is a server action backlog, this can allow malicious actors to perform previously impossible actions. By instead using a decentralized platform, we can build a robust system that allows playing games through a P2P manner, filling in the need for central servers with consensus algorithms that provide the security on the part of a central authority. This project aims to show that a decentralized solution can be used to create a transparent, fully playable game of Monopoly with complex features that would be more scalable, reliable, and cost-effective compared to a centralized solution; meaning that games could be produced that costs pennies to publish and modify, taking seconds to propagate changes globally, and most importantly, cost nothing for upkeep. The codebase is available here: https://github.com/SirNeural/monopoly
ContributorsXu, Yun Hui (Author) / Boscovic, Dragan (Thesis director) / Foy, Joseph (Committee member) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
Description
Proxy digital signatures are a subset of proxy cryptography that enable a peer, as a proxy delegator, to delegate signing privileges to another trusted peer, who becomes a proxy signer. The proxy signer then signs authorized transactions routed to it from the proxy delegator, to then send to the intended

Proxy digital signatures are a subset of proxy cryptography that enable a peer, as a proxy delegator, to delegate signing privileges to another trusted peer, who becomes a proxy signer. The proxy signer then signs authorized transactions routed to it from the proxy delegator, to then send to the intended third party on their behalf. This has great applications for computer networks where certain devices lack sufficient computational power to secure themselves and may rely on trusted and computationally more powerful peers, particularly within edge and fog networks. Although there are multiple proxy digital signature schemas that are circulated within cryptography-centric research papers, a practical software implementation has yet to be created. In this paper we describe Mengde Signatures: the first practical software implementation of proxy digital signatures. We expound upon the current architecture and process for how proxy signatures are implemented and function in a software engineering context. Although applicable to many different types of networks, we showcase the application of Mengde Signatures on an open source Proof-Of-Work Blockchain.
ContributorsMendoza, Francis (Author) / Boscovic, Dragan (Thesis director) / Zhao, Ming (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
164866-Thumbnail Image.png
Description

This project aims to mint NFT's on the Ethereum blockchain with upgraded functionality. This functionality helps user verifiability and increases a user's control over their NFT.

ContributorsHoppe, Aidan (Author) / Boscovic, Dragan (Thesis director) / Pesic, Sasa (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05