Matching Items (467)
Filtering by

Clear all filters

ContributorsChan, Robbie (Performer) / McCarrel, Kyla (Performer) / Sadownik, Stephanie (Performer) / ASU Library. Music Library (Contributor)
Created2018-04-18
151631-Thumbnail Image.png
Description
Whenever a text is transmitted, or communicated by any means, variations may occur because editors, copyists, and performers are often not careful enough with the source itself. As a result, a flawed text may come to be accepted in good faith through repetition, and may often be preferred over the

Whenever a text is transmitted, or communicated by any means, variations may occur because editors, copyists, and performers are often not careful enough with the source itself. As a result, a flawed text may come to be accepted in good faith through repetition, and may often be preferred over the authentic version because familiarity with the flawed copy has been established. This is certainly the case with regard to Manuel M. Ponce's guitar editions. An inexact edition of a musical work is detrimental to several key components of its performance: musical interpretation, aesthetics, and the original musical concept of the composer. These phenomena may be seen in the case of Manuel Ponce's Suite in D Major for guitar. The single published edition by Peer International Corporation in 1967 with the revision and fingering of Manuel López Ramos contains many copying mistakes and intentional, but unauthorized, changes to the original composition. For the present project, the present writer was able to obtain a little-known copy of the original manuscript of this work, and to document these discrepancies in order to produce a new performance edition that is more closely based on Ponce's original work.
ContributorsReyes Paz, Ricardo (Author) / Koonce, Frank (Thesis advisor) / Solis, Theodore (Committee member) / Rotaru, Catalin (Committee member) / Arizona State University (Publisher)
Created2013
ContributorsDaval, Charles (Performer) / ASU Library. Music Library (Publisher)
Created2018-03-26
152422-Thumbnail Image.png
Description
With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may

With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may lead adversaries to access critical information by circumventing security practices. In order to ensure security, considerable efforts have been spent to develop security regulations by facilitating security best-practices. Applying shared security standards to the system is critical to understand vulnerabilities and prevent well-known threats from exploiting vulnerabilities. However, many end users tend to change configurations of their systems without paying attention to the security. Hence, it is not straightforward to protect systems from being changed by unconscious users in a timely manner. Detecting the installation of harmful applications is not sufficient since attackers may exploit risky software as well as commonly used software. In addition, checking the assurance of security configurations periodically is disadvantageous in terms of time and cost due to zero-day attacks and the timing attacks that can leverage the window between each security checks. Therefore, event-driven monitoring approach is critical to continuously assess security of a target system without ignoring a particular window between security checks and lessen the burden of exhausted task to inspect the entire configurations in the system. Furthermore, the system should be able to generate a vulnerability report for any change initiated by a user if such changes refer to the requirements in the standards and turn out to be vulnerable. Assessing various systems in distributed environments also requires to consistently applying standards to each environment. Such a uniformed consistent assessment is important because the way of assessment approach for detecting security vulnerabilities may vary across applications and operating systems. In this thesis, I introduce an automated event-driven security assessment framework to overcome and accommodate the aforementioned issues. I also discuss the implementation details that are based on the commercial-off-the-self technologies and testbed being established to evaluate approach. Besides, I describe evaluation results that demonstrate the effectiveness and practicality of the approaches.
ContributorsSeo, Jeong-Jin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Lee, Joohyung (Committee member) / Arizona State University (Publisher)
Created2014
ContributorsMayo, Joshua (Performer) / ASU Library. Music Library (Publisher)
Created2021-04-29
ContributorsDominguez, Ramon (Performer) / ASU Library. Music Library (Publisher)
Created2021-04-15
ContributorsWhite, Bill (Performer) / ASU Library. Music Library (Publisher)
Created2021-04-03
ContributorsSanchez, Armand (Performer) / Nordstrom, Nathan (Performer) / Roubison, Ryan (Performer) / ASU Library. Music Library (Publisher)
Created2018-04-13
ContributorsMiranda, Diego (Performer)
Created2018-04-06