Theses

MB900305811

  1. Musab Al-Turki, “Rewriting-based Formal Modeling, Analysis and Implementation of Real-time Distributed Services”, PhD Thesis, August 2011. [full text]
  2. Jonas Eckhardt, “Security Analysis in Cloud Computing Using Rewriting Logic”, MS Thesis, January 2012. [full text]
  3. Tobias Muhlbauer, “Formal Specification and Analysis of Cloud Computing Management”, MS Thesis, January 2012. [full text]
  4. Brian Cho, “Satisfying Strong Application Requirements in Data-Intensive Cloud Computing Environments,” PhD Thesis, October 2012. [full text]
  5. Qiaomin Xie, “Routing and Scheduling for Cloud Service Data Centers”, MS Thesis, December 2012. [full text]
  6. Mirko Montanari, “Limiting Information Exposure in Multi-domain Monitoring Systems”, PhD Thesis, July 2013. [full text]
  7. Jon Grov, “Transactional Data Management for Multi-Site Systems”, PhD Thesis, January 2014. [full text]
  8. Cristina Abad, “Big Data Storage Workload Characterization, Modeling and Synthetic Generation”, PhD Thesis March 2014. [full text]
  9. Fangzhou Yao, “Secure Framework for Virtualized Systems with Data Confidentiality Protection”, MS Thesis, December 2014. [full text]
  10. Weijie Liu, “Inter-Flow Consistency: Novel SDN Update Abstraction for Supporting Inter-flow Constraints”, MS Thesis, May 2015. [full text]
  11. John Bellessa, “Implementing MPLS with Label Switching in Software-Defined Networks, MS Thesis, May 2015. [full text]
  12. Mayank Pundir, “ZORRO: Zero-cost Reactive Failure Recovery in Distributed Graph Processing”, MS Thesis, May 2105. [full text]
  13. Xiao Cai, “Phurti: Application and Network-Aware Flow Scheduling for MapReduce”, MS Thesis, May 2015. [full text]
  14. Gary L. Wang, “Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring”, MS Thesis, May 2015. [full text]
  15. Gourav Khaneja, “An Experimental Study of Monolithic Scheduler Architecture in Cloud Computing Systems”, MS Thesis, May 2015. [full text]
  16. Phuong Cao, “An Experiment Using Factor Graph for Early Attack Detection”, MS Thesis, May 2015. [full text]
  17. Uttam Thakore, “A Quantitative Methodology for Evaluating and Deploying Security Monitors”, MS Thesis, August 2015. [full text]
  18. Mohammad Ahmad, “Cauldron: A Framework To Defend Against Cache-Based Side-Channel Attacks In Clouds”, MS Thesis, May 2016.
  19. Zachary Estrada, “Reliability and Security as a Service: A Virtual Machine Approach”, PhD Thesis, University of Illinois at Urbana-Champaign, August 2016.