Matching Items (3,369)
Filtering by

Clear all filters

150497-Thumbnail Image.png
Description
In recent years, service oriented computing (SOC) has become a widely accepted paradigm for the development of distributed applications such as web services, grid computing and cloud computing systems. In service-based systems (SBS), multiple service requests with specific performance requirements make services compete for system resources. IT service providers need

In recent years, service oriented computing (SOC) has become a widely accepted paradigm for the development of distributed applications such as web services, grid computing and cloud computing systems. In service-based systems (SBS), multiple service requests with specific performance requirements make services compete for system resources. IT service providers need to allocate resources to services so the performance requirements of customers can be satisfied. Workload and performance models are required for efficient resource management and service performance assurance in SBS. This dissertation develops two methods to understand and model the cause-effect relations of service-related activities with resources workload and service performance. Part one presents an empirical method that requires the collection of system dynamics data and the application of statistical analyses. The results show that the method is capable to: 1) uncover the impacts of services on resource workload and service performance, 2) identify interaction effects of multiple services running concurrently, 3) gain insights about resource and performance tradeoffs of services, and 4) build service workload and performance models. In part two, the empirical method is used to investigate the impacts of services, security mechanisms and cyber attacks on resources workload and service performance. The information obtained is used to: 1) uncover interaction effects of services, security mechanisms and cyber attacks, 2) identify tradeoffs within limits of system resources, and 3) develop general/specific strategies for system survivability. Finally, part three presents a framework based on the usage profiles of services competing for resources and the resource-sharing schemes. The framework is used to: 1) uncover the impacts of service parameters (e.g. arrival distribution, execution time distribution, priority, workload intensity, scheduling algorithm) on workload and performance, and 2) build service workload and performance models at individual resources. The estimates obtained from service workload and performance models at individual resources can be aggregated to obtain overall estimates of services through multiple system resources. The workload and performance models of services obtained through both methods can be used for the efficient resource management and service performance assurance in SBS.
ContributorsMartinez Aranda, Billibaldo (Author) / Ye, Nong (Thesis advisor) / Wu, Tong (Committee member) / Sarjoughian, Hessam S. (Committee member) / Pan, Rong (Committee member) / Arizona State University (Publisher)
Created2012
151152-Thumbnail Image.png
Description
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control

Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates comprehensive analysis and thorough realization of formal access control models in secure system development. I demonstrate how this method can be applied to build role-based access control systems by adopting the NIST/ANSI RBAC standard as an underlying security model. On the other hand, the AMF framework ensures the correctness of access control policies in policy-based computing through automated reasoning techniques and anomaly management mechanisms. A systematic method is presented to formulate XACML in Answer Set Programming (ASP) that allows users to leverage off-the-shelf ASP solvers for a variety of analysis services. In addition, I introduce a novel anomaly management mechanism, along with a grid-based visualization approach, which enables systematic and effective detection and resolution of policy anomalies. I further evaluate the AMF framework through modeling and analyzing multiparty access control in Online Social Networks (OSNs). A MultiParty Access Control (MPAC) model is formulated to capture the essence of multiparty authorization requirements in OSNs. In particular, I show how AMF can be applied to OSNs for identifying and resolving privacy conflicts, and representing and reasoning about MPAC model and policy. To demonstrate the feasibility of the proposed methodology, a suite of proof-of-concept prototype systems is implemented as well.
ContributorsHu, Hongxin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Dasgupta, Partha (Committee member) / Ye, Nong (Committee member) / Arizona State University (Publisher)
Created2012
135589-Thumbnail Image.png
Description
The Performance Based Studies Research Group (PBSRG) has developed industry-tested leadership and management techniques that have been proven to increase organizational performance. The Leadership Society of Arizona (LSA) has worked closely with PBSRG to develop an educational framework that introduces these leadership concepts to college students. LSA is now endeavoring

The Performance Based Studies Research Group (PBSRG) has developed industry-tested leadership and management techniques that have been proven to increase organizational performance. The Leadership Society of Arizona (LSA) has worked closely with PBSRG to develop an educational framework that introduces these leadership concepts to college students. LSA is now endeavoring to make this curriculum more accessible for K-12 students and educators. As part of a thesis creative project, the author has developed a strategy to connect with and enable local high schools, teachers, and students to engage with the professional industry and higher education. This strategy will allow LSA to connect with up to 150 high school students over the summer of 2016. By making this education easily accessible, the author has accomplished a milestone in the larger effort encompassed by LSA. The course chosen to present to high school students is an abridged variation of the Barrett Honors College course "Deductive Logic: Leadership and Management Techniques". The class framework is designed to instantiate a self-sustaining program for future summer school courses. The summer school course will allow high school students to learn, understand, and apply college level concepts into their education, work, and personal lives. The development of the framework for the program encompasses networking/partnering efforts, marketing package creation, and the delivery of the summer school course over the months of June and July in 2016.
ContributorsDunn, Melissa Anne (Author) / Kashiwagi, Dean (Thesis director) / Kashiwagi, Jacob (Committee member) / Industrial, Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
134317-Thumbnail Image.png
Description
Social media is used by people every day to discuss the nuances of their lives. Major League Baseball (MLB) is a popular sport in the United States, and as such has generated a great deal of activity on Twitter. As fantasy baseball continues to grow in popularity, so does the

Social media is used by people every day to discuss the nuances of their lives. Major League Baseball (MLB) is a popular sport in the United States, and as such has generated a great deal of activity on Twitter. As fantasy baseball continues to grow in popularity, so does the research into better algorithms for picking players. Most of the research done in this area focuses on improving the prediction of a player's individual performance. However, the crowd-sourcing power afforded by social media may enable more informed predictions about players' performances. Players are chosen by popularity and personal preferences by most amateur gamblers. While some of these trends (particularly the long-term ones) are captured by ranking systems, this research was focused on predicting the daily spikes in popularity (and therefore price or draft order) by comparing the number of mentions that the player received on Twitter compared to their previous mentions. In doing so, it was demonstrated that improved fantasy baseball predictions can be made through leveraging social media data.
ContributorsRuskin, Lewis John (Author) / Liu, Huan (Thesis director) / Montgomery, Douglas (Committee member) / Morstatter, Fred (Committee member) / Industrial, Systems (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
135383-Thumbnail Image.png
Description
Billions of people around the world deal with the struggles of poverty every day. Consequently, a number of others have committed themselves to help alleviate poverty. Many various methods are used, and a current consensus on the best method to alleviate poverty is lacking. Generally the methods used or researched

Billions of people around the world deal with the struggles of poverty every day. Consequently, a number of others have committed themselves to help alleviate poverty. Many various methods are used, and a current consensus on the best method to alleviate poverty is lacking. Generally the methods used or researched exist somewhere on the spectrum between top-down and bottom-up approaches to fighting poverty. This paper analyzes a specific method proposed by C.K. Prahalad known as the Bottom of the Pyramid solution. The premise of the method is that large multinational corporations should utilize the large conglomerate of money that exists amongst poor people \u2014 created due to the sheer number of poor people \u2014 for business ventures. Concurrently, the poor people can benefit from the company's entrance. This method has received acclaim theoretically, but still needs empirical evidence to prove its practicality. This paper compares this approach with other approaches, considers international development data trends, and analyzes case studies of actual attempts that provide insight into the approach's potential for success. The market of poor people at the bottom of the pyramid is extremely segmented which makes it very difficult for large companies to financially prosper. It is even harder to establish mutual benefit between the large corporation and the poor. It has been found that although aspects of the bottom of the pyramid method hold merit, higher potential for alleviating poverty exists when small companies venture into this space rather than large multinational corporations. Small companies can conform to a single community and niche economy to prosper \u2014 a flexibility that large companies lack. Moving forward, analyzing the actual attempts provides the best and only empirical insights; hence, it will be important to consider more approaches into developing economies as they materialize.
ContributorsSanchez, Derek Javier (Author) / Henderson, Mark (Thesis director) / Shunk, Dan (Committee member) / Industrial, Systems (Contributor) / Economics Program in CLAS (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05