Aspen Olmsted

Aspen Olmsted
Wentworth Institute of Technology · Department of Computer Science and Computer Networking

PhD

About

95
Publications
78,402
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
266
Citations
Citations since 2017
51 Research Items
224 Citations
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050
Additional affiliations
July 2016 - March 2017
College of Charleston
Position
  • Managing Director
August 2015 - present
College of Charleston
Position
  • Professor (Assistant)
August 2014 - present
College of Charleston
Position
  • Research Assistant
Education
January 2010 - May 2014
University of South Carolina
Field of study
  • Computer Science
August 2008 - December 2009
College of Charleston
Field of study
  • Computer Science
August 2006 - May 2008
University of South Carolina
Field of study
  • Business Administration

Publications

Publications (95)
Chapter
The rapid advancement of technology has resulted in advanced camera capabilities coming to smaller form factors with improved energy efficiency. These improvements have led to more efficient and capable cameras on mobile devices like mobile phones, tablets, and even eyeglasses. Using these unobtrusive cameras, users can capture photographs and vide...
Preprint
Full-text available
The rapid advancement of technology has resulted in advanced camera capabilities coming to smaller form factors with improved energy efficiency. These improvements have led to more efficient and capable cameras on mobile devices like mobile phones, tablets, and even eyeglasses. Using these unobtrusive cameras, users can capture photographs and vide...
Preprint
Full-text available
Healthcare information systems deal with a large amount of Personally Identifiable Information related to patients like dates of birth and social security numbers, patients health information and history, and financial information like credit card details and bank accounts. Most healthcare institutions purchase information systems from commercial v...
Conference Paper
Hardware failures occur more often than we think. Environmental hazards such as electrical fires and liquid spills are easily detected and measured. Programming errors and defective hardware components (such as hard disk spindle defects) often lead to invalid operations, and we understand how and why. However, other less predictable forms of enviro...
Book
Full-text available
The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2020), held on October 25 - 29, 2020, continued a series of events targeted to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open issues and the cha...
Conference Paper
Cloud computing has changed the way commonly used data is stored. Before the adoption of the cloud, most data was preserved in proprietary relational databases. Cloud services provide native storage for several complex data types including contacts, calendar events, tasks and form responses. Along with the cloud services the user is delivered mobil...
Method
Full-text available
Modern operating systems employ CPU scheduling algorithms to minimize wait times for individual processes, overhead caused by switching between processes, and to complete all processes in a fair-ordered manner. Researchers have suggested several improvements to one of the most common scheduling algorithms, Round Robin, by changing the method by whi...
Preprint
Full-text available
Operating system handles a variety of functions such as process management, resource allocation, memory management, networking, file management to name few. Out of these tasks, resource allocation is of utmost importance. The currently existing algorithms have some problems associated with them. Some of them can lead to endless waiting or starvatio...
Book
Full-text available
Proceedings of the Ninth International Conference on Cloud Computing, GRIDs, and Virtualization
Conference Paper
In this paper, we investigate the problem of providing correctness guarantees when representing transaction data in semi-structured documents in cloud-based systems. We compare traditional relational database correctness guarantees including normalization and domain constraints with our correctness guarantees for document-oriented databases. In thi...
Conference Paper
Full-text available
Conference Paper
Full-text available
Conference Paper
Book
Full-text available
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by the cloud computing paradigm and validate the techniques and the mechanisms. A complementary target was to identif...
Conference Paper
In this paper, we investigate the problem of development costs in Platform as-a Service (PAAS) cloud-based systems. We develop a set of tools to analyze the size of code executed to support features in the PAAS. In this research, we specifically focus on stable open source platforms to ensure as much of an equivalent offering from each platform. A...
Conference Paper
The focus of this research work is to investigate the problem of providing partition tolerance in cloud-based applications while maintaining application data integrity. This study looks at developing a cloud application to track sales of admission tickets to a battlefield as a motivating example. Web browsers are run inside the premises of the ente...
Conference Paper
This paper examines the process used in scheduling limited resources for blocks of time. The paper compares a complex algorithm current used to a random assignment system on scheduling equity. This research involved scheduling contracted guides with non-regular schedules to tours in advance or the day of the scheduling process. The random assignmen...
Article
In this paper, I investigate the problem of providing guarantees for heterogeneous system integration. I propose a set of strong properties, FACD, which when held in the integration transaction will deliver correct results. The strong properties support an integration technique called CCETL (Continuous, Consistent, Extract, Translate, and Load). CC...
Conference Paper
With an increasing population, social media is a trendy form of sharing information, which can be a massive pitfall for unwary users. With a number of users that are largely untrained in proper password creation methodologies, this influx of information can be damaging. This paper aims to describe current measures of password strength, the current...
Conference Paper
Automation of information extraction from eligibility criteria will provide a breakthrough in effective utilization of information for patient search in clinical databases. A majority of eligibility criteria contain temporal information associated with medical conditions and events. This project creates a novel natural language processing (NLP) pip...
Conference Paper
In this paper we investigate the problem of manual survey completion for the purposes of market validation. This study resides in the application domain of business market validation as a motivating example. The amount of data which can be output for market validation can be drastically increased through the process of automation. Through the use o...
Conference Paper
In this paper, we investigate the problem of providing highly available, decentralized, dynamic path selection in high performance computing networking. We look at a use case for dynamic path selection that better utilizes bandwidth available in the network. The network architecture we propose is a partial mesh grid whereby each host is directly co...
Conference Paper
In his talk, Olmsted will investigate the problem of developing secure development of cloudbased enterprise applications. Consistency, availability, and durability are investigated for web service (WS) transactions. He proposes an approach that matches the availability of the popular lazy replica update propagation method while increasing durabilit...
Conference Paper
In this paper, we investigate the value of Payment Card Industry Data Security Standard (PCI DSS) by examining popular implementations of hosted payment processing solutions. First, we will dive into Card Connect, a registered ISO of Wells Fargo Bank, and see how their client-side-dependent model allows for trivial manipulation. Then we look at Car...
Conference Paper
The Payment Card Industry Data Security Standard (PCI-DSS, or simply PCI) governs the many security standards associated with payment card transactions. Point of sale systems in today's brick-and-mortar storefronts fall woefully short of these standards at every step of the work flow. They commonly use outdated desktop computers and store card data...
Conference Paper
Cloud services can be consumed using web service calls through the APIs provided by the cloud provider. Although using a fine-grained web-service request allows better flexibility of services, this approach will require service consumers to make multiple service requests to the cloud. The cloud will end up receiving a significantly higher number of...
Conference Paper
In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or fo...
Conference Paper
Social media has a tremendous impact on current culture and trends. It has revolutionized the way in which people communicate with one another. Malicious entities exploit the vulnerabilities brought upon by the availability of personal data content on these networks. Openly sharing personal information online can make a user vulnerable to threats s...
Conference Paper
Full-text available
An application running on an android mobile platform may sometimes crash in the midst of its lifecycle without the user triggering an explicit close action. This is due to memory leaks in the system which are introduced due to insufficient memory handling mechanisms. Memory leaks are not easily identified by testing the application. There are a few...
Conference Paper
Full-text available
Functional Requirements are the primary focus of software development projects for both end users and developers. The Non-Functional Requirements (NFR) are treated as a secondary class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. NFRs are sometimes...
Conference Paper
Full-text available
In this paper, we investigate the problem of representing transaction data in PAAS cloud-based systems. We compare traditional database normalization techniques with our denormalized approach. In this research, we specifically focus on transactional data that is not attached to a specific customer. The absence of the relationship in the customer ob...
Book
Full-text available
The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2016), held between March 20-24, 2016 in Rome, Italy, continued a series of events targeted to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open iss...
Article
Full-text available
Conference Paper
In this paper we look at solutions for notifying patients and medical professionals in the event of a pacemaker failure. Many people depend on pacemakers to regulate their heartbeat. Pacemaker failures can lead to hospital visits or death, making pacemaker failure detection an issue for people with these devices. HeartSync uses an iPhone to simulat...
Conference Paper
In his talk, Dr. Olmsted will investigate the problem of developing secure development of cloud-based enterprise applications. Consistency, availability, and durability are investigated for web service (WS) transactions. He proposes an approach that matches the availability of the popular lazy replica update propagation method while increasing dura...
Conference Paper
In his talk, Dr. Olmsted will investigate the problem of developing secure development of cloud-based enterprise applications. Consistency, availability, and durability are investigated for web service (WS) transactions. He proposes an approach that matches the availability of the popular lazy replica update propagation method while increasing dura...
Conference Paper
Conference Paper
In this talk, I investigate the problem of developing secure development of cloud-based enterprise applications. Consistency, availability, and durability are investigated for web service transactions. I propose an approach that matches the availability of the popular lazy replica update propagation method while increasing durability and consistenc...
Conference Paper
There are numerous concerns on an enterprise network. Especially one populated by uncontrollable users and devices. The network this paper focuses on is the network of an academic higher education institution. This paper will concentrate on a case study of how to facilitate the formation of an on-campus cybersecurity student-run club. In our case,...
Conference Paper
In this paper I investigate the problem of providing application domain security constraints to distributed systems will maintaining high availability. This study uses the application domain of business loyalty incentives as a motivating example. The loyalty incentives are earned through electronic point and currency programs while the modeled syst...
Article
Full-text available
Article
In this paper we investigate the problem of providing web service interception hooks while maintaining consistency, high availability and durability for Web Service transactions. We consider ways of adding runtime configurable interception hooks for after release customization while guaranteeing the correctness of the entire transaction. We study i...
Article
Grade calculation in historical educational environments depends on a grade journal that is only visible to the instructor. In modern educational environments, this journal has been replaced by more transparency in the form of a computerized learning management system. Unfortunately, there are not correctness guarantees for the students and the fac...
Conference Paper
Full-text available
In this paper, I investigate the problem of providing ACID guarantees for continuous data integration. I proposed an integration technique called CCETL (Continuous, Consistent, Extract, Translate and Load). CCETL consumes UML class diagrams to identify transactional membership of the data elements that makeup the integration. CCETL transforms the h...
Article
Full-text available
In this paper we investigate the problem of providing consistency, availability and durability for Web Service transactions. We consider enforcement of integrity constraints in a way that increases the availability while guaranteeing the correctness specified in the constraint. We study hierarchical constraints that offer an opportunity for optimiz...
Article
Full-text available
In this paper we investigate the problem of providing consistency, availability and durability for web service transactions. We propose an approach that matches the availability of the popular lazy replica update propagation method while increases the durability and consistency. Our replica update propagation method is called the Buddy System, whic...
Conference Paper
In this paper we investigate the problem of providing consistency, availability and durability for Web Service transactions. We consider enforcement of integrity constraints in a way that increases availability while guaranteeing the correctness specified in the constraint. We study hierarchical constraints that offer an opportunity for optimizatio...
Conference Paper
In this paper we investigate the problem of providing consistency, availability and durability for Web Service-transactions. We consider each transaction as a black box, with only the corresponding metadata, expressed as UML specifications, as transaction semantics. We refer to these WS transactions as coarse-grained WS-transactions. We propose an...
Conference Paper
In this paper we investigate the problem of providing consistency, availability and durability for Web Service-transactions. We consider each transaction as a black box, with only the corresponding metadata, expressed as UML specifications, as transaction semantics. We refer to these WS transactions as coarse-grained WS-transactions. We propose an...
Conference Paper
Our project is a scalable community-driven spectroscopic annotation system for the field of metabolomics, which is the study of the of the identifying products left behind by the process of metabolism. This project is a Google-based laboratory information management system or gLIMS. This system combines the intuitive Google Drive interface and stor...
Article
Full-text available
In this paper we investigate the problem of provid-ing durability for Web Service transactions in the pres-ence of system failures. We show that the popular lazy replica update propagation method is vulnerable to loss of transactional updates in the presence of hardware failures. We propose an extension to the lazy update propagation approach to re...
Conference Paper
In this paper we investigate the problem of providing consistency, availability and durability for Web Service transactions that consume anonymous and attribute based resources. We show that the availability of the popular lazy replica update propagation method can be achieved while increasing it's durability and consistency. Our approach is based...

Questions

Questions (3)
Question
I am chairing a special session at The Eleventh International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2017). The special session will focus on Secure Software Development (SSD). The conference will take place in Rome from September 10th to the 14th.
Secure software development is the process involving people and practices that ensure application Confidentiality, Integrity, Availability, Non-Repudiation, and Authentication (CIANA). Secure software is the result of a security aware software development processes, where CIANA is established when an application is first developed. Current Secure Software Development LifeCycles (SSDLC) are just old Software Development LifeCycles (SDLC) with a security training pre-pended before the traditional development steps, and an incident response process appended to the end of the lifecycle. To solve application cyber-security issues, one needs to develop the models, tools, architectures, and algorithms that support CIANA on the first day of a development project.
SECURWARE is a terrific cyber-security conference and community to become associated with. Please let me know if you have colleagues or students who would be interested in submitting. Because this is a special session, I can take submission up until August 2nd. The late submission date makes it an ideal place for the dissemination of the results from your Summer research projects
Question
I am chairing a special session at The Eleventh International Conference on Emerging Security Information, Systems, and Technologies (SECUREWAR 2017). The special session will focus on Secure Software Development (SSD). The conference will take place in Rome from September 10th to the 14th.
Secure software development is the process involving people and practices that ensure application Confidentiality, Integrity, Availability, Non-Repudiation, and Authentication (CIANA). Secure software is the result of a security aware software development processes, where CIANA is established when an application is first developed. Current Secure Software Development LifeCycles (SSDLC) are just old Software Development LifeCycles (SDLC) with a security training prepended before the traditional development steps, and an incident response process appended to the end of the lifecycle. To solve application cyber-security issues, one needs to develop the models, tools, architectures, and algorithms that support CIANA on the first day of a development project.
Secureware is a terrific cyber-security conference and community to become associated with. Please let me know if you have colleagues or students who would be interested in submitting. Because this is a special session, I can take submission up until August 2nd. The late submission date makes it an ideal place for the dissemination of the results from your Summer research projects
Question
PKI guarantees that a machine is who it says it is through 3 party system?  What about processes on the same machine.  I want to validate that a signed or encrypted message came from a specific process.

Network

Cited By