Matching Items (281)
150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
148132-Thumbnail Image.png
Description

Laminated composites are increasingly being used in various industries including <br/>automotive and aerospace. Under a variety of extreme loading conditions such as low and <br/>high-velocity impacts and crash, laminated composites delaminate. To understand how and<br/>when delamination occurs, two types of laboratory tests are conducted - End-notched <br/>Flexure (ENF) test and

Laminated composites are increasingly being used in various industries including <br/>automotive and aerospace. Under a variety of extreme loading conditions such as low and <br/>high-velocity impacts and crash, laminated composites delaminate. To understand how and<br/>when delamination occurs, two types of laboratory tests are conducted - End-notched <br/>Flexure (ENF) test and Double Cantilever Beam (DCB) test. The ENF test is designed to <br/>find the mode II interlaminar fracture toughness, and the DCB test, the mode I interlaminar <br/>fracture toughness. In this thesis, thermopressed Honeywell Spectra Shield® 5231 <br/>composite specimens made of ultra-high molecular weight polyethylene (UHMWPE), <br/>manufactured under two different pressures (3000 psi and 6000 psi), are tested in the <br/>laboratory to find its delamination properties. The test specimen preparation, experimental <br/>procedures, and data reduction to determine the mode I and mode II interlaminar fracture <br/>properties are discussed. The ENF test results show a 15.8% increase in strain energy <br/>release rate for the 6000 psi specimens when compared to the 3000 psi specimens. <br/>Conducting the DCB tests proved to be challenging due to the low compressive strength <br/>of the material and hence required modifications to the test specimens. An estimate of the <br/>mode I interlaminar fracture toughness was found for only two of the 6000 psi specimens.

ContributorsRyder, Chandler (Author) / Rajan, Subramaniam (Thesis director) / Khaled, Bilal (Committee member) / Neithalath, Narayanan (Committee member) / Mechanical and Aerospace Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
149953-Thumbnail Image.png
Description
The theme for this work is the development of fast numerical algorithms for sparse optimization as well as their applications in medical imaging and source localization using sensor array processing. Due to the recently proposed theory of Compressive Sensing (CS), the $\ell_1$ minimization problem attracts more attention for its ability

The theme for this work is the development of fast numerical algorithms for sparse optimization as well as their applications in medical imaging and source localization using sensor array processing. Due to the recently proposed theory of Compressive Sensing (CS), the $\ell_1$ minimization problem attracts more attention for its ability to exploit sparsity. Traditional interior point methods encounter difficulties in computation for solving the CS applications. In the first part of this work, a fast algorithm based on the augmented Lagrangian method for solving the large-scale TV-$\ell_1$ regularized inverse problem is proposed. Specifically, by taking advantage of the separable structure, the original problem can be approximated via the sum of a series of simple functions with closed form solutions. A preconditioner for solving the block Toeplitz with Toeplitz block (BTTB) linear system is proposed to accelerate the computation. An in-depth discussion on the rate of convergence and the optimal parameter selection criteria is given. Numerical experiments are used to test the performance and the robustness of the proposed algorithm to a wide range of parameter values. Applications of the algorithm in magnetic resonance (MR) imaging and a comparison with other existing methods are included. The second part of this work is the application of the TV-$\ell_1$ model in source localization using sensor arrays. The array output is reformulated into a sparse waveform via an over-complete basis and study the $\ell_p$-norm properties in detecting the sparsity. An algorithm is proposed for minimizing a non-convex problem. According to the results of numerical experiments, the proposed algorithm with the aid of the $\ell_p$-norm can resolve closely distributed sources with higher accuracy than other existing methods.
ContributorsShen, Wei (Author) / Mittlemann, Hans D (Thesis advisor) / Renaut, Rosemary A. (Committee member) / Jackiewicz, Zdzislaw (Committee member) / Gelb, Anne (Committee member) / Ringhofer, Christian (Committee member) / Arizona State University (Publisher)
Created2011
149803-Thumbnail Image.png
Description
With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.
ContributorsKulkarni, Ketan (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
149851-Thumbnail Image.png
Description
This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute,

This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute, and the code generates results which are sent to the external entity. These results provide the external entity an assurance as to whether the client application and the OS are in pristine condition. This work also presents a technique where it can be verified that the application which was attested, did not get replaced by a different application after completion of the attestation. The implementation of these three techniques was achieved entirely in software and is backward compatible with legacy machines on the Intel x86 architecture. This research also presents two approaches to incorporating software based "root of trust" using Virtual Machine Monitors (VMMs). The first approach determines the integrity of an executing Guest OS from the Host OS using Linux Kernel-based Virtual Machine (KVM) and qemu emulation software. The second approach implements a small VMM called MIvmm that can be utilized as a trusted codebase to build security applications such as those implemented in this research. MIvmm was conceptualized and implemented without using any existing codebase; its minimal size allows it to be trustworthy. Both the VMM approaches leverage processor support for virtualization in the Intel x86 architecture.
ContributorsSrinivasan, Raghunathan (Author) / Dasgupta, Partha (Thesis advisor) / Colbourn, Charles (Committee member) / Shrivastava, Aviral (Committee member) / Huang, Dijiang (Committee member) / Dewan, Prashant (Committee member) / Arizona State University (Publisher)
Created2011
149858-Thumbnail Image.png
Description
This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large,

This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large, linearly increasing ciphertext. The proposed CCP-ABE dramatically reduces the ciphertext to small, constant size. This is the first existing ABE scheme that achieves constant ciphertext size. Also, the proposed CCP-ABE scheme is fully collusion-resistant such that users can not combine their attributes to elevate their decryption capacity. Next step, efficient ABE schemes are applied to construct optimal group communication schemes and broadcast encryption schemes. An attribute based Optimal Group Key (OGK) management scheme that attains communication-storage optimality without collusion vulnerability is presented. Then, a novel broadcast encryption model: Attribute Based Broadcast Encryption (ABBE) is introduced, which exploits the many-to-many nature of attributes to dramatically reduce the storage complexity from linear to logarithm and enable expressive attribute based access policies. The privacy issues are also considered and addressed in ABSS. Firstly, a hidden policy based ABE schemes is proposed to protect receivers' privacy by hiding the access policy. Secondly,a new concept: Gradual Identity Exposure (GIE) is introduced to address the restrictions of hidden policy based ABE schemes. GIE's approach is to reveal the receivers' information gradually by allowing ciphertext recipients to decrypt the message using their possessed attributes one-by-one. If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. Last but not least, ABSS are incorporated into the mobile cloud computing scenarios. In the proposed secure mobile cloud data management framework, the light weight mobile devices can securely outsource expensive ABE operations and data storage to untrusted cloud service providers. The reported scheme includes two components: (1) a Cloud-Assisted Attribute-Based Encryption/Decryption (CA-ABE) scheme and (2) An Attribute-Based Data Storage (ABDS) scheme that achieves information theoretical optimality.
ContributorsZhou, Zhibin (Author) / Huang, Dijiang (Thesis advisor) / Yau, Sik-Sang (Committee member) / Ahn, Gail-Joon (Committee member) / Reisslein, Martin (Committee member) / Arizona State University (Publisher)
Created2011
150148-Thumbnail Image.png
Description
In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and

In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases. The aim of this work is to conceive and design a framework that provides a completely new architecture that 1) can perform fundamental functions that are common and necessary to forensic analyses, and 2) is structured such that it is possible to include collaboration-facilitating components without changing the way users interact with the system sans collaboration. This framework is called the Collaborative Forensic Framework (CUFF). CUFF is constructed from four main components: Cuff Link, Storage, Web Interface, and Analysis Block. With the Cuff Link acting as a mediator between components, CUFF is flexible in both the method of deployment and the technologies used in implementation. The details of a realization of CUFF are given, which uses a combination of Java, the Google Web Toolkit, Django with Apache for a RESTful web service, and an Ubuntu Enterprise Cloud using Eucalyptus. The functionality of CUFF's components is demonstrated by the integration of an acquisition script designed for Android OS-based mobile devices that use the YAFFS2 file system. While this work has obvious application to examination labs which work under the mandate of judicial or investigative bodies, security officers at any organization would benefit from the improved ability to cooperate in electronic discovery efforts and internal investigations.
ContributorsMabey, Michael Kent (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
152317-Thumbnail Image.png
Description
Nuclear magnetic resonance (NMR) is an important phenomenon involving nuclear magnetic moments in magnetic field, which can provide much information about a wide range of materials, including their chemical composition, chemical environments and nuclear spin interactions. The NMR spectrometer has been extensively developed and used in many areas of research.

Nuclear magnetic resonance (NMR) is an important phenomenon involving nuclear magnetic moments in magnetic field, which can provide much information about a wide range of materials, including their chemical composition, chemical environments and nuclear spin interactions. The NMR spectrometer has been extensively developed and used in many areas of research. In this thesis, studies in two different areas using NMR are presented. First, a new kind of nanoparticle, Gd(DTPA) intercalated layered double hydroxide (LDH), has been successfully synthesized in the laboratory of Prof. Dey in SEMTE at ASU. In Chapter II, the NMR relaxation studies of two types of LDH (Mg, Al-LDH and Zn, Al-LDH) are presented and the results show that when they are intercalated with Gd(DTPA) they have a higher relaxivity than current commercial magnetic resonance imaging (MRI) contrast agents, such as DTPA in water solution. So this material may be useful as an MRI contrast agent. Several conditions were examined, such as nanoparticle size, pH and intercalation percentage, to determine the optimal relaxivity of this nanoparticle. Further NMR studies and simulations were conducted to provide an explanation for the high relaxivity. Second, fly ash is a kind of cementitious material, which has been of great interest because, when activated by an alkaline solution, it exhibits the capability for replacing ordinary Portland cement as a concrete binder. However, the reaction of activated fly ash is not fully understood. In chapter III, pore structure and NMR studies of activated fly ash using different activators, including NaOH and KOH (4M and 8M) and Na/K silicate, are presented. The pore structure, degree of order and proportion of different components in the reaction product were obtained, which reveal much about the reaction and makeup of the final product.
ContributorsPeng, Zihui (Author) / Marzke, Robert F (Thesis advisor) / Dey, Sandwip Kumar (Committee member) / Neithalath, Narayanan (Committee member) / Chamberlin, Ralph Vary (Committee member) / Mccartney, Martha Rogers (Committee member) / Arizona State University (Publisher)
Created2013
152334-Thumbnail Image.png
Description
This study focused on investigating the ability of a polymeric-enhanced high-tenacity fabric composite called CarbonFlex to mitigate damages from multi-natural hazards, which are earthquakes and tornadoes, in wood-framed structures. Typically, wood-framed shear wall is a seismic protection system used in low-rise wood structures. It is well-known that the main energy

This study focused on investigating the ability of a polymeric-enhanced high-tenacity fabric composite called CarbonFlex to mitigate damages from multi-natural hazards, which are earthquakes and tornadoes, in wood-framed structures. Typically, wood-framed shear wall is a seismic protection system used in low-rise wood structures. It is well-known that the main energy dissipation of the system is its fasteners (nails) which are not enough to dissipate energy leading to decreasing of structure's integrity. Moreover, wood shear walls could not sustain their stiffness after experiencing moderate wall drift which made them susceptible to strong aftershocks. Therefore, CarbonFlex shear wall system was proposed to be used in the wood-framed structures. Seven full-size CarbonFlex shear walls and a CarbonFlex wrapped structures were tested. The results were compared to those of conventional wood-framed shear walls and a wood structure. The comparisons indicated that CarbonFlex specimens could sustain their strength and fully recover their initial stiffness although they experienced four percent story drift while the stiffness of the conventional structure dramatically degraded. This indicated that CarbonFlex shear wall systems provided a better seismic protection to wood-framed structures. To evaluate capability of CarbonFlex to resist impact damages from wind-borne debris in tornadoes, several debris impact tests of CarbonFlex and a carbon fiber reinforced storm shelter's wall panels were conducted. The results showed that three CarbonFlex wall panels passed the test at the highest debris impact speed and the other two passed the test at the second highest speed while the carbon fiber panel failed both impact speeds.
ContributorsDhiradhamvit, Kittinan (Author) / Attard, Thomas L (Thesis advisor) / Fafitis, Apostolos (Thesis advisor) / Neithalath, Narayanan (Committee member) / Thomas, Benjamin (Committee member) / Arizona State University (Publisher)
Created2013
152338-Thumbnail Image.png
Description
The increased emphasis on the detrimental effects of the production of construction materials such as ordinary portland cement (OPC) have driven studies of the alkali activation of aluminosilicate materials as binder systems derived from industrial byproducts. They have been extensively studied due to the advantages they offer in terms of

The increased emphasis on the detrimental effects of the production of construction materials such as ordinary portland cement (OPC) have driven studies of the alkali activation of aluminosilicate materials as binder systems derived from industrial byproducts. They have been extensively studied due to the advantages they offer in terms of enhanced material properties, while increasing sustainability by the reuse of industrial waste and reducing the adverse impacts of OPC production. Ground granulated blast furnace slag is one of the commonly used materials for their content of calcium and silica species. Alkaline activators such as silicates, aluminates etc. are generally used. These materials undergo dissolution, polymerization with the alkali, condensation on particle surfaces and solidification under the influence of alkaline activators. Exhaustive studies exploring the effects of sodium silicate as an activator however there is a significant lack of work on exploring the effect of the cation and the effect of liquid and powder activators. The focus of this thesis is hence segmented into two topics: (i) influence of liquid Na and K silicate activators to explore the effect of silicate and hydroxide addition and (ii) influence of powder Na and K Silicate activators to explore the effect of cation, concentration and silicates. Isothermal calorimetric studies have been performed to evaluate the early hydration process, and to understand the reaction kinetics of the liquid and powder alkali activated systems. The reaction kinetics had an impact on the early age behavior of these binders which can be explained by the compressive strength results. It was noticed that the concentration and silica modulus of the activator had a greater influence than the cation over the compressive strength. Quantification of the hydration products resultant from these systems was performed via thermo gravimetric analysis (TGA). The difference in the reaction products formed with varying cation and silicate addition in these alkali activated systems is brought out. Fourier transform infrared (FTIR) spectroscopy was used to investigate the degree of polymerization achieved in these systems. This is indicative of silica and alumina bonds in the system. Differences in the behavior of the cation are attributable to size of the hydration sphere and polarizing effect of the cation which are summarized at the end of the study.
ContributorsDakhane, Akash (Author) / Neithalath, Narayanan (Thesis advisor) / Subramaniam, Dharmarajan (Committee member) / Mobashar, Barzin (Committee member) / Arizona State University (Publisher)
Created2013