Matching Items (16)
155039-Thumbnail Image.png
Description
Access control has been historically recognized as an effective technique for ensuring that computer systems preserve important security properties. Recently, attribute-based

access control (ABAC) has emerged as a new paradigm to provide access mediation

by leveraging the concept of attributes: observable properties that become relevant under a certain security context and are

Access control has been historically recognized as an effective technique for ensuring that computer systems preserve important security properties. Recently, attribute-based

access control (ABAC) has emerged as a new paradigm to provide access mediation

by leveraging the concept of attributes: observable properties that become relevant under a certain security context and are exhibited by the entities normally involved in the mediation process, namely, end-users and protected resources. Also recently, independently-run organizations from the private and public sectors have recognized the benefits of engaging in multi-disciplinary research collaborations that involve sharing sensitive proprietary resources such as scientific data, networking capabilities and computation time and have recognized ABAC as the paradigm that suits their needs for restricting the way such resources are to be shared with each other. In such a setting, a robust yet flexible access mediation scheme is crucial to guarantee participants are granted access to such resources in a safe and secure manner.

However, no consensus exists either in the literature with respect to a formal model that clearly defines the way the components depicted in ABAC should interact with each other, so that the rigorous study of security properties to be effectively pursued. This dissertation proposes an approach tailored to provide a well-defined and formal definition of ABAC, including a description on how attributes exhibited by different independent organizations are to be leveraged for mediating access to shared resources, by allowing for collaborating parties to engage in federations for the specification, discovery, evaluation and communication of attributes, policies, and access mediation decisions. In addition, a software assurance framework is introduced to support the correct construction of enforcement mechanisms implementing our approach by leveraging validation and verification techniques based on software assertions, namely, design by contract (DBC) and behavioral interface specification languages (BISL). Finally, this dissertation also proposes a distributed trust framework that allows for exchanging recommendations on the perceived reputations of members of our proposed federations, in such a way that the level of trust of previously-unknown participants can be properly assessed for the purposes of access mediation.
ContributorsRubio Medrano, Carlos Ernesto (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Zhao, Ziming (Committee member) / Santanam, Raghu (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2016
153547-Thumbnail Image.png
Description
Mobile applications (Apps) markets with App stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. Several distinctive features of mobile App store markets including – (a) highly heterogeneous consumer preferences and values, (b) high consumer cognitive burden

Mobile applications (Apps) markets with App stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. Several distinctive features of mobile App store markets including – (a) highly heterogeneous consumer preferences and values, (b) high consumer cognitive burden of searching a large selection of similar Apps, and (c) continuously updateable product features and price – present a unique opportunity for IS researchers to investigate theoretically motivated research questions in this area. The aim of this dissertation research is to investigate the key determinants of mobile Apps success in App store markets. The dissertation is organized into three distinct and related studies. First, using the key tenets of product portfolio management theory and theory of economies of scope, this study empirically investigates how sellers’ App portfolio strategies are associated with sales performance over time. Second, the sale performance impacts of App product cues, generated from App product descriptions and offered from market formats, are examined using the theories of market signaling and cue utilization. Third, the role of App updates in stimulating consumer demands in the presence of strong ranking effects is appraised. The findings of this dissertation work highlight the impacts of sellers’ App assortment, strategic product description formulation, and long-term App management with price/feature updates on success in App market. The dissertation studies make key contributions to the IS literature by highlighting three key managerially and theoretically important findings related to mobile Apps: (1) diversification across selling categories is a key driver of high survival probability in the top charts, (2) product cues strategically presented in the descriptions have complementary relationships with market cues in influencing App sales, and (3) continuous quality improvements have long-term effects on App success in the presence of strong ranking effects.
ContributorsLee, Gun Woong (Author) / Santanam, Raghu (Thesis advisor) / Gu, Bin (Committee member) / Park, Sungho (Committee member) / Arizona State University (Publisher)
Created2015
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
161792-Thumbnail Image.png
Description
Various activities move online in the era of the digital economy. Platform design and policy can heavily affect online user activities and result in many expected and unexpected consequences. In this dissertation, I conduct empirical studies on three types of online platforms to investigate the influence of their platform policy

Various activities move online in the era of the digital economy. Platform design and policy can heavily affect online user activities and result in many expected and unexpected consequences. In this dissertation, I conduct empirical studies on three types of online platforms to investigate the influence of their platform policy on their user engagement and associated outcomes. Specifically, in Study 1, I focus on goal-directed platforms and study how the introduction of the mobile channel affects users’ goal pursuit engagement and persistence. In Study 2, I focus on social media and online communities. I study the introduction of machine-powered platform regulation and its impacts on volunteer moderators’ engagement. In Study 3, I focus on online political discourse forums and examine the role of identity declaration in user participation and polarization in the subsequent political discourse. Overall, my results highlight how various platform policies shape user behavior. Implications on multi-channel adoption, human-machine collaborative platform governance, and online political polarization research are discussed.
ContributorsHe, Qinglai (Author) / Santanam, Raghu (Thesis advisor) / Hong, Yili (Thesis advisor) / Burtch, Gordon (Committee member) / Arizona State University (Publisher)
Created2021
129469-Thumbnail Image.png
Description

Mobile applications markets with app stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. This research examines key seller- and app-level characteristics that impact success in an app store market. We tracked individual apps and their presence

Mobile applications markets with app stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. This research examines key seller- and app-level characteristics that impact success in an app store market. We tracked individual apps and their presence in the top-grossing 300 chart in Apple's App Store and examined how factors at different levels affect the apps' survival in the top 300 chart. We used a generalized hierarchical modeling approach to measure sales performance, and confirmed the results with the use of a hazard model and a count regression model. We find that broadening app offerings across multiple categories is a key determinant that contributes to a higher probability of survival in the top charts. App-level attributes such as free app offers, high initial ranks, investment in less-popular (less-competitive) categories, continuous quality updates, and high-volume and high-user review scores have positive effects on apps' sustainability. In general, each diversification decision across a category results in an approximately 15 percent increase in the presence of an app in the top charts. Survival rates for free apps are up to two times more than that for paid apps. Quality (feature) updates to apps can contribute up to a threefold improvement in survival rate as well. A key implication of the results of this study is that sellers must utilize the natural segmentation in consumer tastes offered by the different categories to improve sales performance.

ContributorsLee, Gun-woong (Author) / Santanam, Raghu (Author) / W.P. Carey School of Business (Contributor)
Created2013-11-30
129660-Thumbnail Image.png
Description

Information systems research is replete with examples of the importance of business processes defining IT adoption. Business processes are influenced by both organizational and operational concerns. We evaluate the comparative importance of operational and organizational influences for complementary IT systems. In the context of acute-care hospitals the analysis shows that

Information systems research is replete with examples of the importance of business processes defining IT adoption. Business processes are influenced by both organizational and operational concerns. We evaluate the comparative importance of operational and organizational influences for complementary IT systems. In the context of acute-care hospitals the analysis shows that an organizational approach to automating a process is related to different financial outcomes than an operational approach. Six complementary systems supporting a three-stage medication management process are studied: prescribing, dispensing, and administration. The analysis uses firm-level, panel data extracted from the HIMSS Analytics database spanning ten years of IT adoption for 140 hospitals. We have augmented the HIMSS dataset with matching demographic and financial details from the American Hospital Association and the Centers for Medicare and Medicaid Services. Using event sequence analysis we explore whether organizations are more likely to adopt organization boundary spanning systems and if the sequence of adoption follows the temporal ordering of the business process steps. The research also investigates if there is a relationship between the paths to IT adoption and financial performance. Comparison of the two measures suggests that the organizational model of adoption is observed more often in the data. Following the organizational model of adoption is associated with approximately $155 dollar increase in net income per patient day; whereas the operational model of adoption is associated with approximately $225 dollars decrease in net income per patient day. However, this effect diminishes with the adoption of each additional system thus demonstrating that the adoption path effects may only be relevant in the short-term.

ContributorsSpaulding, Trent J. (Author) / Furukawa, Michael (Author) / Santanam, Raghu (Author) / Vinze, Ajay (Author) / W.P. Carey School of Business (Contributor)
Created2013-09-05