Matching Items (8)
Filtering by

Clear all filters

151653-Thumbnail Image.png
Description
Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling

Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling language in order to enhance expressivity, such as incorporating aggregates and interfaces with ontologies. Also, in order to overcome the grounding bottleneck of computation in ASP, there are increasing interests in integrating ASP with other computing paradigms, such as Constraint Programming (CP) and Satisfiability Modulo Theories (SMT). Due to the non-monotonic nature of the ASP semantics, such enhancements turned out to be non-trivial and the existing extensions are not fully satisfactory. We observe that one main reason for the difficulties rooted in the propositional semantics of ASP, which is limited in handling first-order constructs (such as aggregates and ontologies) and functions (such as constraint variables in CP and SMT) in natural ways. This dissertation presents a unifying view on these extensions by viewing them as instances of formulas with generalized quantifiers and intensional functions. We extend the first-order stable model semantics by by Ferraris, Lee, and Lifschitz to allow generalized quantifiers, which cover aggregate, DL-atoms, constraints and SMT theory atoms as special cases. Using this unifying framework, we study and relate different extensions of ASP. We also present a tight integration of ASP with SMT, based on which we enhance action language C+ to handle reasoning about continuous changes. Our framework yields a systematic approach to study and extend non-monotonic languages.
ContributorsMeng, Yunsong (Author) / Lee, Joohyung (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Baral, Chitta (Committee member) / Fainekos, Georgios (Committee member) / Lifschitz, Vladimir (Committee member) / Arizona State University (Publisher)
Created2013
151508-Thumbnail Image.png
Description
Forrest Research estimated that revenues derived from mobile devices will grow at an annual rate of 39% to reach $31 billion by 2016. With the tremendous market growth, mobile banking, mobile marketing, and mobile retailing have been recently introduced to satisfy customer needs. Academic and practical articles have widely discussed

Forrest Research estimated that revenues derived from mobile devices will grow at an annual rate of 39% to reach $31 billion by 2016. With the tremendous market growth, mobile banking, mobile marketing, and mobile retailing have been recently introduced to satisfy customer needs. Academic and practical articles have widely discussed unique features of m-commerce. For instance, hardware constraints such as small screens have led to the discussion of tradeoff between usability and mobility. Needs for personalization and entertainment foster the development of new mobile data services. Given distinct features of mobile data services, existing empirical literature on m-commerce is mostly from the consumer side and focuses on consumer perceptions toward these features and their adoption intentions. From the supply side, limited data availability in early years explains the lack of firm-level studies on m-commerce. Prior studies have shown that unclear market demand is a major reason that hinders firms' adoption of m-commerce. Given the advances of smart phones, especially the introduction of the iPhone in 2007, firms recently have started to incorporate various mobile information systems in their business operations. The study uses mobile retailing as the context and empirically assesses firms' migration to this new sales venue with a unique cross-sectional dataset. Despite the distinct features of m-commerce, m-Retailing is essentially an extended arm of e-Retailing. Thus, a dependency perspective is used to explore the link between a firm's e-Retail characteristics and the migration to m-Retailing. Rooted in the innovation diffusion theory, the first stage of my study assesses the decision of adoption that indicates whether a firm moves to m-Retailing and the extent of adoption that shows a firm's commitment to m-Retailing in terms of system implementation choices. In this first stage, I take a dependency perspective to examine the impacts of e-Retail characteristics on m-Retailing adoption. The second stage of my study analyzes conditions that affect business value of the m-Retail channel. I examine the association between system implementation choices and m-Retail performance while analyzing the effects of e-Retail characteristics on value realization. The two-stage analysis provides an exploratory assessment of firm's migration from e-Retailing to m-Retailing.
ContributorsChou, Yen-Chun (Author) / Shao, Benjamin (Thesis advisor) / St. Louis, Robert (Committee member) / Goul, Michael (Committee member) / Arizona State University (Publisher)
Created2013
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
151049-Thumbnail Image.png
Description
The e-Retail industry has grown rapidly over the last few years and is projected to continue its upward trend as consumers shift from traditional channels to online channels. In March 2010, Forrester Research forecasted that online retail sales will grow by 10% a year for the next 5 years and

The e-Retail industry has grown rapidly over the last few years and is projected to continue its upward trend as consumers shift from traditional channels to online channels. In March 2010, Forrester Research forecasted that online retail sales will grow by 10% a year for the next 5 years and e-Retail sales will amount to $249 billion by 2014. With intense competition for market share and profits, information systems and technology (IST) sourcing decisions are becoming increasingly important to e-Retail firms to support continued growth and market responsiveness. There are several aspects for e-Retailers to consider when formulating its IST sourcing strategy. Whether to choose make versus buy for technology assets and services has been addressed in both strategy and IS literature (Handfield et al. 1999, Leiblein et al. 2002, Wade and Hulland, 2004). Then there is the follow-up question of selecting a best-of-breed strategy or tighter partnership with a select group of vendors (Clemons et al. 1993, Kauffman and Tsai 2009). Few studies have looked at IST sourcing or proposed models and frameworks for evaluating IST sourcing decisions (Saarinen and Vepsalainen, 1994). Furthermore, these existing studies mainly address the antecedents of the decisions but not so much on their performance effects (Kauffman and Tsai 2009; Smith et al., 1998). The goal of this study is to extend the knowledge of IST sourcing for e-Retailers, a topic which has received limited attention (Kishore et al., 2004), by addressing a core problem: How should an e-Retailer develop and implement its IST sourcing strategy to accommodate the increase in consumer demand and IT complexity but still achieve high performance? The study introduces two theoretical models to examine organizational factors that influence an e-Retailer's IST sourcing strategies of make versus buy and partnership versus best-of-breed. The proposed models are tested using a panel data set of 307 e-Retail firms over the period of 2006 to 2010. The study opens up the black box of internal firm operations by introducing a granular view of IST sourcing decisions at both the value chain and e-Commerce architecture levels and examining the performance impacts of these strategic choices. This in-depth look at IST sourcing has yet to be explored in the literature.
ContributorsTsai, Juliana Yuh-Shun (Author) / Shao, Benjamin B. M. (Thesis advisor) / Goul, Michael (Committee member) / Santanam, Raghu T. (Committee member) / St. Louis, Robert D. (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
155954-Thumbnail Image.png
Description
The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They

The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, scam, and robocalls.

In this dissertation, a study of what causes the users to fall victim to telephone scams is presented, and it demonstrates that impersonation is at the heart of the problem. Most solutions today primarily rely on gathering offending caller IDs, however, they do not work effectively when the caller ID has been spoofed. Due to a lack of authentication in the PSTN caller ID transmission scheme, fraudsters can manipulate the caller ID to impersonate a trusted entity and further a variety of scams. To provide a solution to this fundamental problem, a novel architecture and method to authenticate the transmission of the caller ID is proposed. The solution enables the possibility of a security indicator which can provide an early warning to help users stay vigilant against telephone impersonation scams, as well as provide a foundation for existing and future defenses to stop unwanted telephone communication based on the caller ID information.
ContributorsTu, Huahong (Author) / Doupe, Adam (Thesis advisor) / Ahn, Gail-Joon (Thesis advisor) / Huang, Dijiang (Committee member) / Zhang, Yanchao (Committee member) / Zhao, Ziming (Committee member) / Arizona State University (Publisher)
Created2017
155149-Thumbnail Image.png
Description
Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made

Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made cyber systems omnipotent, and control many aspects of human lives. Emerging trends in successful cyber system breaches have shown increasing sophistication in attacks and that attackers are no longer limited by resources, including human and computing power. Most existing cyber defense systems for IoT systems have two major issues: (1) they do not incorporate human user behavior(s) and preferences in their approaches, and (2) they do not continuously learn from dynamic environment and effectively adapt to thwart sophisticated cyber-attacks. Consequently, the security solutions generated may not be usable or implementable by the user(s) thereby drastically reducing the effectiveness of these security solutions.

In order to address these major issues, a comprehensive approach to securing ubiquitous smart devices in IoT environment by incorporating probabilistic human user behavioral inputs is presented. The approach will include techniques to (1) protect the controller device(s) [smart phone or tablet] by continuously learning and authenticating the legitimate user based on the touch screen finger gestures in the background, without requiring users’ to provide their finger gesture inputs intentionally for training purposes, and (2) efficiently configure IoT devices through controller device(s), in conformance with the probabilistic human user behavior(s) and preferences, to effectively adapt IoT devices to the changing environment. The effectiveness of the approach will be demonstrated with experiments that are based on collected user behavioral data and simulations.
ContributorsBuduru, Arun Balaji (Author) / Yau, Sik-Sang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Davulcu, Hasan (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2016
151361-Thumbnail Image.png
Description
The dissertation explores how participants view the relationships between democratic principles such as freedom, liberty, justice, and equality in work and home environments and their impact on the health and productivity of people living within these environments. This information can be used to determine the gap between legal democratic instruments

The dissertation explores how participants view the relationships between democratic principles such as freedom, liberty, justice, and equality in work and home environments and their impact on the health and productivity of people living within these environments. This information can be used to determine the gap between legal democratic instruments established the published laws and rights and the participants understanding and awareness of these rights. The first step in effectively capturing information from the participants involved developing a virtual ethnographic research system architecture prototype that allowed participants to voice their opinions related to democracy and how the application of democratic principles in various lived environments such as the workplace and home can affect their health and productivity. The dissertation starts by first delving into what democracy is within the context of general social research and social contracts as related to everyday interactions between individuals within organizational environments. Second, it determines how democracy affects individual human rights and their well-being within lived environments such as their workplace and home. Third, it identifies how technological advances can be used to educate and improve democratic processes within various lived environments such that individuals are given an equal voice in decisions that affect their health and well-being, ensuring that they able to secure justice and fairness within their lives. The virtual ethnographic research system architecture prototype tested the ability of a web application and database technology to provide a more dynamic and longitudinal methodology allowing participants to voice their opinions related to the relationship of democracy in work and home environments to the health and productivity of the people who live within these environments. The technology enables continuous feedback as participants are educated about democracy and their lived environments, unlike other research methods that take a one-time view of situations and apply them to continuously changing environments. The analysis of the participant's answers to the various qualitative and quantitative questions indicated that the majority of participants agree that a positive relationship exists between democracy in work and home environments and the health and productivity of the individuals who live within these environments.
ContributorsBooze, Randall Ray (Author) / Romero, Mary (Thesis advisor) / Goul, Michael (Committee member) / Schugurensky, Daniel, 1958- (Committee member) / Arizona State University (Publisher)
Created2012