Matching Items (50)
149668-Thumbnail Image.png
Description
Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Compared with traditional software system components which are usually specifically designed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS requirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users' functionality requirements, the service discovery approach presented in this dissertation further considers service users' QoS requirements in two steps. First, this approach optimizes services' QoS by making tradeoff among various QoS aspects with users' QoS requirements and preferences. Second, this approach ranks services based on how well they satisfy users' QoS requirements to help service users select the most suitable service to develop their SBSs.
ContributorsYin, Yin (Author) / Yau, Stephen S. (Thesis advisor) / Candan, Kasim (Committee member) / Dasgupta, Partha (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2011
149803-Thumbnail Image.png
Description
With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.
ContributorsKulkarni, Ketan (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
149807-Thumbnail Image.png
Description
This thesis describes research into the application of socially reflective, or "Slow", design principles to modern mediated systems, or "Fast" technology. The "information overload" caused by drastic changes in the nature of human communications in the last decade has become a serious problem, with many human-technology interactions creating mental confusion,

This thesis describes research into the application of socially reflective, or "Slow", design principles to modern mediated systems, or "Fast" technology. The "information overload" caused by drastic changes in the nature of human communications in the last decade has become a serious problem, with many human-technology interactions creating mental confusion, personal discomfort and a sense of disconnection. Slow design principles aim to help create interactions that avoid these problems by increasing interaction richness, encouraging engagement with local communities, and promoting personal and communal reflection. Three major functional mediated systems were constructed to examine the application of Slow principles on multiple scales: KiteViz, Taskville and Your ____ Here. Each system was designed based on a survey of current research within the field and previous research results. KiteViz is a visually metaphorical display of Twitter activity within a small group, Taskville is a workplace game designed to support collaboration and group awareness in an enterprise, and Your ____ Here is a physical-digital projection system that augments built architecture with user-submitted content to promote discussion and reflection. Each system was tested with multiple users and user groups, the systems were evaluated for their effectiveness in supporting each of the tenets of Slow design, and the results were collected into a set of key findings. Each system was considered generally effective, with specific strengths varying. The thesis concludes with a framework of five major principles to be used in the design of modern, highly-mediated systems that still apply Slow design principles: design for fundamental understanding, handle complexity gracefully, Slow is a process of evolution and revelation, leverage groups and personal connections to encode value, and allow for participation across a widely distributed range of scales.
ContributorsLinn, Silvan (Author) / Kelliher, Aisling G (Thesis advisor) / Tinapple, David (Committee member) / Boradkar, Prasad (Committee member) / Arizona State University (Publisher)
Created2011
150195-Thumbnail Image.png
Description
Mid-Century ranch house architecture and design is significant to the architectural landscape of the Phoenix Metropolitan Area. The increasing age of the city's post-WWII properties is creating a need for renovation and rehabilitation, and new technologies have created modern conveniences for today's homeowners, changing interior space plan requirements. These homeowners

Mid-Century ranch house architecture and design is significant to the architectural landscape of the Phoenix Metropolitan Area. The increasing age of the city's post-WWII properties is creating a need for renovation and rehabilitation, and new technologies have created modern conveniences for today's homeowners, changing interior space plan requirements. These homeowners will need guidance to alter these properties correctly and to preserve the home's essential features. This thesis analyzes the design trends and materials used during the mid-twentieth century, and demonstrates methods for applying them to a current renovation project. The research outlined in this document proves that it is possible to maintain historic integrity, include "Green" design strategies, and apply contemporary technology to a modern ranch renovation.
ContributorsSimmons, Rachel (Author) / Brandt, Beverly (Thesis advisor) / Warren-Findley, Janelle (Committee member) / Boradkar, Prasad (Committee member) / Arizona State University (Publisher)
Created2009
150082-Thumbnail Image.png
Description
This dissertation examines the use of color in lowrider car customizations. It studies the relationships among car owners, car painters, and car clubs in the process of selection, and manipulation of color. This research studies how color is constructed as an element for individual and community differentiation. Also included is

This dissertation examines the use of color in lowrider car customizations. It studies the relationships among car owners, car painters, and car clubs in the process of selection, and manipulation of color. This research studies how color is constructed as an element for individual and community differentiation. Also included is the examination of the influence of car clubs in the design process, the understanding of color by car painters and car owners, and the cultural values associated with color in this community. This research argues that through the use, manipulation, and implementation of color as a visual/design element, lowriders challenge, transgress, and resist the preconceived notions of space, aesthetic hegemony, and social disparity they experience. In this case, color as a cultural expression, becomes a pivotal element to narrate and retell their stories of struggle and endurance, as well as to envision a different world. This research frames Chicana/o vernacular production, and color use as being central to the borderland experience of this community. Finally, this research follows the discourse of taste, as this concept has been used to create social categories of exotic otherness and the perpetuation of specific aesthetic epistemologies. In this context, it presents lowriders as expression of a Chicana/o network of vernacular border knowledge. This dissertation concludes by framing the Low n' Slow movement, in the context of healing and emancipating practices enacted by subjugated communities in order to survive, give sense to their reality, and to envision a more egalitarian world.
ContributorsCalvo, William (Author) / Giard, Jacques (Thesis advisor) / Boradkar, Prasad (Committee member) / Foster, David William (Committee member) / Arizona State University (Publisher)
Created2011
150148-Thumbnail Image.png
Description
In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and

In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases. The aim of this work is to conceive and design a framework that provides a completely new architecture that 1) can perform fundamental functions that are common and necessary to forensic analyses, and 2) is structured such that it is possible to include collaboration-facilitating components without changing the way users interact with the system sans collaboration. This framework is called the Collaborative Forensic Framework (CUFF). CUFF is constructed from four main components: Cuff Link, Storage, Web Interface, and Analysis Block. With the Cuff Link acting as a mediator between components, CUFF is flexible in both the method of deployment and the technologies used in implementation. The details of a realization of CUFF are given, which uses a combination of Java, the Google Web Toolkit, Django with Apache for a RESTful web service, and an Ubuntu Enterprise Cloud using Eucalyptus. The functionality of CUFF's components is demonstrated by the integration of an acquisition script designed for Android OS-based mobile devices that use the YAFFS2 file system. While this work has obvious application to examination labs which work under the mandate of judicial or investigative bodies, security officers at any organization would benefit from the improved ability to cooperate in electronic discovery efforts and internal investigations.
ContributorsMabey, Michael Kent (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
137208-Thumbnail Image.png
Description
In a world in which technologies proliferate at a rapid rate, it is no surprise that the medical device industry has grown in leaps and bounds. This surge in medical technology, especially implantable medical technology, has altered the modern operating room, transforming surgery from a technique-driven activity into a technology-driven

In a world in which technologies proliferate at a rapid rate, it is no surprise that the medical device industry has grown in leaps and bounds. This surge in medical technology, especially implantable medical technology, has altered the modern operating room, transforming surgery from a technique-driven activity into a technology-driven profession. This reliance upon technologies has fostered close ties between physicians and the medical device industry and within this relationship, medical device representatives play an integral role. This paper will investigate the relationship that exists between physicians and the medical device industry along with the potential conflicts of interest that may result due to this relationship. I will focus in particular on orthopedic medical devices due to media attention as a result of a 2007 Department of Justice settlement involving the leading orthopedic companies. This case proved instrumental in highlighting previously unknown instances in which conflicts of interest were occurring in the medical device industry.
ContributorsLove, Kailey (Author) / Robert, Jason (Thesis director) / Marchant, Gary (Committee member) / Buchholtz, Stephanie (Committee member) / Barrett, The Honors College (Contributor) / School of International Letters and Cultures (Contributor) / School of Life Sciences (Contributor) / School for the Science of Health Care Delivery (Contributor)
Created2014-05
152278-Thumbnail Image.png
Description
The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool in the commission of crime. Current forensic practices focus mostly on that of disk forensics, while email forensics is left as an analysis task stemming from that practice. As there

The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool in the commission of crime. Current forensic practices focus mostly on that of disk forensics, while email forensics is left as an analysis task stemming from that practice. As there is no well-defined process to be used for email forensics the comprehensiveness, extensibility of tools, uniformity of evidence, usefulness in collaborative/distributed environments, and consistency of investigations are hindered. At present, there exists little support for discovering, acquiring, and representing web-based email, despite its widespread use. To remedy this, a systematic process which includes discovering, acquiring, and representing web-based email for email forensics which is integrated into the normal forensic analysis workflow, and which accommodates the distinct characteristics of email evidence will be presented. This process focuses on detecting the presence of non-obvious artifacts related to email accounts, retrieving the data from the service provider, and representing email in a well-structured format based on existing standards. As a result, developers and organizations can collaboratively create and use analysis tools that can analyze email evidence from any source in the same fashion and the examiner can access additional data relevant to their forensic cases. Following, an extensible framework implementing this novel process-driven approach has been implemented in an attempt to address the problems of comprehensiveness, extensibility, uniformity, collaboration/distribution, and consistency within forensic investigations involving email evidence.
ContributorsPaglierani, Justin W (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Santanam, Raghu T (Committee member) / Arizona State University (Publisher)
Created2013
152315-Thumbnail Image.png
Description
ABSTRACT Whole genome sequencing (WGS) and whole exome sequencing (WES) are two comprehensive genomic tests which use next-generation sequencing technology to sequence most of the 3.2 billion base pairs in a human genome (WGS) or many of the estimated 22,000 protein-coding genes in the genome (WES). The promises offered from

ABSTRACT Whole genome sequencing (WGS) and whole exome sequencing (WES) are two comprehensive genomic tests which use next-generation sequencing technology to sequence most of the 3.2 billion base pairs in a human genome (WGS) or many of the estimated 22,000 protein-coding genes in the genome (WES). The promises offered from WGS/WES are: to identify suspected yet unidentified genetic diseases, to characterize the genomic mutations in a tumor to identify targeted therapeutic agents and, to predict future diseases with the hope of promoting disease prevention strategies and/or offering early treatment. Promises notwithstanding, sequencing a human genome presents several interrelated challenges: how to adequately analyze, interpret, store, reanalyze and apply an unprecedented amount of genomic data (with uncertain clinical utility) to patient care? In addition, genomic data has the potential to become integral for improving the medical care of an individual and their family, years after a genome is sequenced. Current informed consent protocols do not adequately address the unique challenges and complexities inherent to the process of WGS/WES. This dissertation constructs a novel informed consent process for individuals considering WGS/WES, capable of fulfilling both legal and ethical requirements of medical consent while addressing the intricacies of WGS/WES, ultimately resulting in a more effective consenting experience. To better understand components of an effective consenting experience, the first part of this dissertation traces the historical origin of the informed consent process to identify the motivations, rationales and institutional commitments that sustain our current consenting protocols for genetic testing. After understanding the underlying commitments that shape our current informed consent protocols, I discuss the effectiveness of the informed consent process from an ethical and legal standpoint. I illustrate how WGS/WES introduces new complexities to the informed consent process and assess whether informed consent protocols proposed for WGS/WES address these complexities. The last section of this dissertation describes a novel informed consent process for WGS/WES, constructed from the original ethical intent of informed consent, analysis of existing informed consent protocols, and my own observations as a genetic counselor for what constitutes an effective consenting experience.
ContributorsHunt, Katherine (Author) / Hurlbut, J. Benjamin (Thesis advisor) / Robert, Jason S. (Thesis advisor) / Maienschein, Jane (Committee member) / Northfelt, Donald W. (Committee member) / Marchant, Gary (Committee member) / Ellison, Karin (Committee member) / Arizona State University (Publisher)
Created2013
151890-Thumbnail Image.png
Description
Gender and sex are often conflated. Our laws, policies, and even science establish sex and gender as intrinsically linked and dimorphic in nature. This dissertation examines the relationship between sex and gender and the repercussions of this linked dimorphism in the realms of law, politics, and science. Chapter One identifies

Gender and sex are often conflated. Our laws, policies, and even science establish sex and gender as intrinsically linked and dimorphic in nature. This dissertation examines the relationship between sex and gender and the repercussions of this linked dimorphism in the realms of law, politics, and science. Chapter One identifies the legal climate for changing one's sexual identity post-surgical reassignment. It pays particular attention to the ability of postsurgical transsexuals to marry in their acquired sex. Chapter Two considers the process for identifying the sex of athletes for the purposes of participation in sex-segregated athletic events, specifically the role of testing and standards for categorization. Chapter Three explores the process of identifying and assigning the sex of intersex children. Chapter Four examines the process of prenatal sex selection and its ethical implications. Chapter Four also offers an anticipatory governance framework to address these implications.
ContributorsParsi, John (Author) / Crittenden, Jack (Thesis advisor) / Guston, David H. (Committee member) / Marchant, Gary (Committee member) / Arizona State University (Publisher)
Created2013