Matching Items (11)
Filtering by

Clear all filters

151462-Thumbnail Image.png
Description
Embodied Continuity documents the methodology of Entangled/Embraced, a dance performance piece presented December, 2011 and created as an artistic translation of research conducted January-May, 2011 in the states of Karnataka and Kerala, South India. Focused on the sciences of Ayurveda, Kalaripayattu and yoga, this research stems from an interest in

Embodied Continuity documents the methodology of Entangled/Embraced, a dance performance piece presented December, 2011 and created as an artistic translation of research conducted January-May, 2011 in the states of Karnataka and Kerala, South India. Focused on the sciences of Ayurveda, Kalaripayattu and yoga, this research stems from an interest in body-mind connectivity, body-mind-environment continuity, embodied epistemology and the implications of ethnography within artistic practice. The document begins with a theoretical grounding covering established research on theories of embodiment; ethnographic methodologies framing research conducted in South India including sensory ethnography, performance ethnography and autoethnography; and an explanation of the sciences of Ayurveda, Kalaripayattu and yoga with a descriptive slant that emphasizes concepts of embodiment and body-mind-environment continuity uniquely inherent to these sciences. Following the theoretical grounding, the document provides an account of methods used in translating theoretical concepts and experiences emerging from research in India into the creation of the Entangled/Embraced dance work. Using dancer and audience member participation to inspire emergent meanings and maintain ethnographic consciousness, Embodied Continuity demonstrates how concepts inspiring research interests, along with ideas emerging from within research experiences, in addition to philosophical standpoints embedded in the ethnographic methodologies chosen to conduct research, weave into the entire project of Entangled/Embraced to unite the phases of research and performance, ethnography and artistry.
ContributorsRamsey, Ashlee (Author) / Vissicaro, Pegge (Thesis advisor) / Standley, Eileen (Committee member) / Dove, Simon (Committee member) / Arizona State University (Publisher)
Created2012
149809-Thumbnail Image.png
Description
Bisexuality is a unique kind of sexual identity, as a gray area between heterosexuality and homosexuality. The piece You made up the Story and I Played with all the Parts explores bisexuality as a lived artistic experience based on my sexual journey within a society that advocates heterosexuality. The piece

Bisexuality is a unique kind of sexual identity, as a gray area between heterosexuality and homosexuality. The piece You made up the Story and I Played with all the Parts explores bisexuality as a lived artistic experience based on my sexual journey within a society that advocates heterosexuality. The piece includes movement phrases and text derived from conversations with intimate partners, characters based on former partners, storytelling, a 1950s-style sex education video parody, and audience participation via dialogue. The creation of movement and dialogue manipulated heteronormative social stigmas into a canny social acceptance of bisexuality. The multifaceted nature of the piece provokes viewers to consider how sexuality is constructed socially through my own interpretation. As a result, the work suggests that bisexuality is a legitimate sexual identity and represents a culture within American society.
ContributorsBedford, Crystal (Author) / Corey, Frederick (Thesis advisor) / Dove, Simon (Thesis advisor) / Jackson, Naomi (Committee member) / Arizona State University (Publisher)
Created2011
149858-Thumbnail Image.png
Description
This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large,

This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large, linearly increasing ciphertext. The proposed CCP-ABE dramatically reduces the ciphertext to small, constant size. This is the first existing ABE scheme that achieves constant ciphertext size. Also, the proposed CCP-ABE scheme is fully collusion-resistant such that users can not combine their attributes to elevate their decryption capacity. Next step, efficient ABE schemes are applied to construct optimal group communication schemes and broadcast encryption schemes. An attribute based Optimal Group Key (OGK) management scheme that attains communication-storage optimality without collusion vulnerability is presented. Then, a novel broadcast encryption model: Attribute Based Broadcast Encryption (ABBE) is introduced, which exploits the many-to-many nature of attributes to dramatically reduce the storage complexity from linear to logarithm and enable expressive attribute based access policies. The privacy issues are also considered and addressed in ABSS. Firstly, a hidden policy based ABE schemes is proposed to protect receivers' privacy by hiding the access policy. Secondly,a new concept: Gradual Identity Exposure (GIE) is introduced to address the restrictions of hidden policy based ABE schemes. GIE's approach is to reveal the receivers' information gradually by allowing ciphertext recipients to decrypt the message using their possessed attributes one-by-one. If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. Last but not least, ABSS are incorporated into the mobile cloud computing scenarios. In the proposed secure mobile cloud data management framework, the light weight mobile devices can securely outsource expensive ABE operations and data storage to untrusted cloud service providers. The reported scheme includes two components: (1) a Cloud-Assisted Attribute-Based Encryption/Decryption (CA-ABE) scheme and (2) An Attribute-Based Data Storage (ABDS) scheme that achieves information theoretical optimality.
ContributorsZhou, Zhibin (Author) / Huang, Dijiang (Thesis advisor) / Yau, Sik-Sang (Committee member) / Ahn, Gail-Joon (Committee member) / Reisslein, Martin (Committee member) / Arizona State University (Publisher)
Created2011
150827-Thumbnail Image.png
Description
In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more

In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more willing to shift their electronic medical record (EMR) systems to clouds that can remove the geographical distance barriers among providers and patient. Even though cloud-based EMRs have received considerable attention since it would help achieve lower operational cost and better interoperability with other healthcare providers, the adoption of security-aware cloud systems has become an extremely important prerequisite for bringing interoperability and efficient management to the healthcare industry. Since a shared electronic health record (EHR) essentially represents a virtualized aggregation of distributed clinical records from multiple healthcare providers, sharing of such integrated EHRs may comply with various authorization policies from these data providers. In this work, we focus on the authorized and selective sharing of EHRs among several parties with different duties and objectives that satisfies access control and compliance issues in healthcare cloud computing environments. We present a secure medical data sharing framework to support selective sharing of composite EHRs aggregated from various healthcare providers and compliance of HIPAA regulations. Our approach also ensures that privacy concerns need to be accommodated for processing access requests to patients' healthcare information. To realize our proposed approach, we design and implement a cloud-based EHRs sharing system. In addition, we describe case studies and evaluation results to demonstrate the effectiveness and efficiency of our approach.
ContributorsWu, Ruoyu (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2012
151152-Thumbnail Image.png
Description
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control

Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates comprehensive analysis and thorough realization of formal access control models in secure system development. I demonstrate how this method can be applied to build role-based access control systems by adopting the NIST/ANSI RBAC standard as an underlying security model. On the other hand, the AMF framework ensures the correctness of access control policies in policy-based computing through automated reasoning techniques and anomaly management mechanisms. A systematic method is presented to formulate XACML in Answer Set Programming (ASP) that allows users to leverage off-the-shelf ASP solvers for a variety of analysis services. In addition, I introduce a novel anomaly management mechanism, along with a grid-based visualization approach, which enables systematic and effective detection and resolution of policy anomalies. I further evaluate the AMF framework through modeling and analyzing multiparty access control in Online Social Networks (OSNs). A MultiParty Access Control (MPAC) model is formulated to capture the essence of multiparty authorization requirements in OSNs. In particular, I show how AMF can be applied to OSNs for identifying and resolving privacy conflicts, and representing and reasoning about MPAC model and policy. To demonstrate the feasibility of the proposed methodology, a suite of proof-of-concept prototype systems is implemented as well.
ContributorsHu, Hongxin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Dasgupta, Partha (Committee member) / Ye, Nong (Committee member) / Arizona State University (Publisher)
Created2012
149834-Thumbnail Image.png
Description
This thesis, Impressive Mastermind, examines notions of privacy and the law, particularly with regard to the USA Patriot Act implemented following the events of 9/11. The author/artist believes that numerous freedoms related to personal privacy, especially those rights protected by the Fourth Amendment, were diminished in order to ostensibly seek

This thesis, Impressive Mastermind, examines notions of privacy and the law, particularly with regard to the USA Patriot Act implemented following the events of 9/11. The author/artist believes that numerous freedoms related to personal privacy, especially those rights protected by the Fourth Amendment, were diminished in order to ostensibly seek out potential terrorists. Through the vehicle of a theatrical dance performance, Impressive Mastermind investigates these privacy issues on a public and personal level and also asks the audience to question their own views on government policies regarding personal privacy, including illegal search and seizure. Drawing on the previous work of other intervention artists, this thesis explores the realm of public intervention. Moving away from the usual spectacle of traditional theater, this multi-dimensional piece explores an experiential examination of how the public relates to what is real and what is considered performative.
ContributorsFerrell, Rebecca A (Author) / Murphey, Claudia (Thesis advisor) / Dove, Simon (Committee member) / Mcgurgan, Melissa (Committee member) / Arizona State University (Publisher)
Created2011
154708-Thumbnail Image.png
Description
This project explores the cultivation of artistic methodologies centered in embodied movement practices. I worked in collaboration with dancers to inform the development of a movement vocabulary that is authentic to the individual as well as to the content of the work. Through the interplay between movement and subconscious response

This project explores the cultivation of artistic methodologies centered in embodied movement practices. I worked in collaboration with dancers to inform the development of a movement vocabulary that is authentic to the individual as well as to the content of the work. Through the interplay between movement and subconscious response to elements such as writing, imagery, and physical environments I created authentic kinesthetic experiences for both dancer and audience. I submerged dancers into a constructed environment by creating authentic mental and physical experiences that supported the development of embodied movement. This was the impetus to develop the evening length work, Flesh Narratives, which consisted of five vignettes, each containing its own distinctive creative process driven by the content of each section. This project was presented January 29- 31, 2016 in the Fine Arts Center room 122, an informal theatre space, that supplemented an immersive experience in an intimate environment for forty viewers. This project explored themes of transformation including cycles, concepts of life, death and reincarnation, and enlightenment. Through the art of storytelling, the crafting of embodied movers, and the theory of Hauntology, the viewer was taken on a journey of struggle, loss, and rebirth.
ContributorsGerena, Jenny (Author) / Standley, Eileen (Thesis advisor) / Rosenkrans, Angela (Committee member) / Britt, Melissa (Committee member) / Arizona State University (Publisher)
Created2016
154767-Thumbnail Image.png
Description
Microblogging services such as Twitter, Sina Weibo, and Tumblr have been emerging and deeply embedded into people's daily lives. Used by hundreds of millions of users to connect the people worldwide and share and access information in real-time, the microblogging service has also became the target of malicious attackers due

Microblogging services such as Twitter, Sina Weibo, and Tumblr have been emerging and deeply embedded into people's daily lives. Used by hundreds of millions of users to connect the people worldwide and share and access information in real-time, the microblogging service has also became the target of malicious attackers due to its massive user engagement and structural openness. Although existed, little is still known in the community about new types of vulnerabilities in current microblogging services which could be leveraged by the intelligence-evolving attackers, and more importantly, the corresponding defenses that could prevent both the users and the microblogging service providers from being attacked. This dissertation aims to uncover a number of challenging security and privacy issues in microblogging services and also propose corresponding defenses.

This dissertation makes fivefold contributions. The first part presents the social botnet, a group of collaborative social bots under the control of a single botmaster, demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation, and propose the corresponding countermeasures and evaluate their effectiveness. Inspired by Pagerank, the second part describes TrueTop, the first sybil-resilient system to find the top-K influential users in microblogging services with very accurate results and strong resilience to sybil attacks. TrueTop has been implemented to handle millions of nodes and 100 times more edges on commodity computers. The third and fourth part demonstrate that microblogging systems' structural openness and users' carelessness could disclose the later's sensitive information such as home city and age. LocInfer, a novel and lightweight system, is presented to uncover the majority of the users in any metropolitan area; the dissertation also proposes MAIF, a novel machine learning framework that leverages public content and interaction information in microblogging services to infer users' hidden ages. Finally, the dissertation proposes the first privacy-preserving social media publishing framework to let the microblogging service providers publish their data to any third-party without disclosing users' privacy and meanwhile meeting the data's commercial utilities. This dissertation sheds the light on the state-of-the-art security and privacy issues in the microblogging services.
ContributorsZhang, Jinxue (Author) / Zhang, Yanchao (Thesis advisor) / Zhang, Junshan (Committee member) / Ying, Lei (Committee member) / Ahn, Gail-Joon (Committee member) / Arizona State University (Publisher)
Created2016
155244-Thumbnail Image.png
Description
Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile

Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing.

This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, the first part develops a novel scheme to enable a new way of trust relationship called spatiotemporal matching in a privacy-preserving and efficient fashion. To enhance the secure communication among mobile users, the second part proposes a game-theoretical framework to stimulate the cooperative shared secret key generation among mobile users. The third and fourth parts investigate the security and privacy issues in mobile crowdsourcing. In particular, the third part presents a secure and privacy-preserving mobile crowdsourcing system which strikes a good balance among object security, user privacy, and system efficiency. The fourth part demonstrates a differentially private distributed stream monitoring system via mobile crowdsourcing. Finally, the fifth part proposes VISIBLE, a novel video-assisted keystroke inference framework that allows an attacker to infer a tablet user's typed inputs on the touchscreen by recording and analyzing the video of the tablet backside during the user's input process. Besides, some potential countermeasures to this attack are also discussed. This dissertation sheds the light on the state-of-the-art security and privacy issues in mobile computing.
ContributorsSun, Jingchao (Author) / Zhang, Yanchao (Thesis advisor) / Zhang, Junshan (Committee member) / Ying, Lei (Committee member) / Ahn, Gail-Joon (Committee member) / Arizona State University (Publisher)
Created2017
149403-Thumbnail Image.png
Description
ABSTRACT Moving beyond Form: Communicating Identity through Dance chronicles the journey of investigating my personal creative process in dance. This was a search for strategies to empower myself creatively, enabling me to move beyond the limitations of a prescribed form or style of dance and communicate ideas that

ABSTRACT Moving beyond Form: Communicating Identity through Dance chronicles the journey of investigating my personal creative process in dance. This was a search for strategies to empower myself creatively, enabling me to move beyond the limitations of a prescribed form or style of dance and communicate ideas that were relevant to me. But on a deeper level, it was an exploration of my capacity to self-define through movement. The challenge led me to graduate school, international study with world-renowned choreographers and to the development of a holistic creative practice, Movement to Meaning. The aim of this creative practice is to express internal awareness through movement, thereby enabling the mover to dance from an internal reference point. In my research, I utilized Movement to Meaning to re-contextualize Sandia, a traditional-based dance that is indigenous to various Mande subgroups in West Africa. This project culminated in a choreographic presentation, Ten For Every Thousand, which was performed in October 2010 at the Nelson Fine Arts Center at Arizona State University in Tempe, Arizona.
ContributorsDavis, Omilade (Author) / Vissicaro, Pegge (Thesis advisor) / Dove, Simon (Committee member) / Sunkett, Mark (Committee member) / Arizona State University (Publisher)
Created2010