Ashish Kundu  Ashish Kundu photo       

contact information

Master Inventor and Research Staff Member
Thomas J. Watson Research Center, Yorktown Heights, NY, USA, 10598
  +1dash914dash945dash3000

links

Professional Associations

Professional Associations:  ACM  |  IEEE


2016

An efficient parallel implementation of a light-weight data privacy method for mobile cloud users
Bahrami, Mehdi and Li, Dong and Singhal, Mukesh and Kundu, Ashish
Proceedings of the 7th International Workshop on Data-Intensive Computing in the Cloud, pp. 51--58, 2016
Abstract

Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud
Katsuno, Yasuharu and Kundu, Ashish and Das, Koushik K and Takahashi, Hitomi and Schloss, Robert and Dey, Prasenjit and Mohania, Mukesh
Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on, pp. 359--366
Abstract

Managing sensitive applications in the public cloud
Beaty, Kirk A and Chow, Jenny M and Cunha, Renato LF and Das, Koushik K and Hulber, MF and Kundu, Ashish and Michelini, Vanessa and Palmer, ER
IBM Journal of Research and Development 60(2-3), 4--1, IBM, 2016
Abstract


2014

Towards a systematic study of the covert channel attacks in smartphones
Chandra, Swarup and Lin, Zhiqiang and Kundu, Ashish and Khan, Latifur
International Conference on Security and Privacy in Communication Systems, pp. 427--435, 2014
Abstract

Security of graph data: hashing schemes and definitions
Arshad, Muhammad U and Kundu, Ashish and Bertino, Elisa and Madhavan, Krishna and Ghafoor, Arif
Proceedings of the 4th ACM conference on Data and application security and privacy, pp. 223--234, 2014
Abstract

Use-case centric dashboard for cloud solutions
Deshpande, Pralhad and Sharma, Shachi and Acharya, Arup and Beaty, Kirk A and Kundu, Ashish
Services Computing (SCC), 2014 IEEE International Conference on, pp. 840--841
Abstract

Service usage metering in hybrid cloud environments
Naik, Vijay K and Beaty, Kirk and Kundu, Ashish
Cloud Engineering (IC2E), 2014 IEEE International Conference on, pp. 253--260
Abstract


2013

Privacy-preserving authentication of trees and graphs
Kundu, Ashish and Bertino, Elisa
International journal of information security 12(6), 467--494, Springer, 2013

Towards Authenticated Objects
Midi, Daniele and Kundu, Ashish and Bertino, Elisa
International Conference on Network and System Security, pp. 777--783, 2013

Network-level access control management for the cloud
Beaty, Kirk and Kundu, Ashish and Naik, Vijay and Acharya, Arup
Cloud Engineering (IC2E), 2013 IEEE International Conference on, pp. 98--107


2012

On Hashing Graphs.
Kundu, Ashish and Bertino, Elisa
IACR Cryptology ePrint Archive2012, 352

Efficient Leakage-free Authentication of Trees, Graphs and Forests.
Kundu, Ashish and Atallah, Mikhail J and Bertino, Elisa
IACR Cryptology ePrint Archive2012, 36

On Hashing Graphs
A. Kundu, E. Bertino
IACR Cryptology ePrint Archive pp. 2012/352

Efficient Leakage-free Authentication of Trees, Graphs and Forests.
Ashish Kundu, Mikhail J. Atallah, Elisa Bertino
IACR Cryptology ePrint Archive pp. 2012/36

Authentication of Data on Devices
A. Kundu
ICDE Workshop on Secure Data Management on Smartphones and Mobiles, 2012

Leakage-Free Redactable Signatures
A. Kundu, M. J. Atallah and E. Bertino
ACM CODASPY, 2012


2011

A New Class of Buffer Overflow Attacks
A. Kundu, E. Bertino
ICDCS, IEEE, 2011


2010

Data in the Cloud: Authentication without Leaking
A. Kundu
Ph.D. Dissertation, Department of Computer Science, Purdue University, 2010

How to authenticate graphs without leaking
Ashish Kundu, Elisa Bertino
Proceedings of the 13th International Conference on Extending Database Technology, pp. 609--620, ACM, 2010



2009

Integrity of graphs without leaking
Kundu, Ashish and Bertino, Elisa
Proceedings of the 10th Annual Information Security Symposium, pp. 20, 2009

Leakage-Free Integrity Assurance for Tree Data Structures
A Kundu, E Bertino
Technical Report, CERIAS, 2009

SN2K attacks and honest services
A Kundu
SAPSE '09 (Workshop on Security Aspects of Process and Services Eng.), pp. 445--450, 2009


2008

A serious form of attack: SN2K-software-based need-to-know (N2K) attacks
Kundu, Ashish
Proceedings of the 9th Annual Information Security Symposium, pp. 5, 2008

SN2K-Software-based Need-to-Know Attacks
A. Kundu
9th Annual CERIAS Symposium, 2008

A new model for secure dissemination of XML content
A Kundu, E Bertino
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on 38(3), 292--301, IEEE, 2008

Practical Strengthening of Preconditions
A Kundu, P Eugster
Technical Report, Department of Computer Science, Purdue University, 2008

A tree-covering problem arising in integrity of tree-structured data
M J Atallah, G N Frederickson, A Kundu
Information Processing Letters 109(1), 79--82, Elsevier, 2008

Structural signatures for tree data structures
Ashish Kundu, Elisa Bertino
Proc. VLDB Endow.1, 138--150, VLDB Endowment, 2008



2007

Completely-secure Sharing of Trees and Hierarchical Content
A. Kundu, E. Bertino
8th Annual CERIAS Symposium, 2007


2006

Reasoning about Data Integrity using Post-order Numbers
A. Kundu, E. Bertino
Midwest Security Workshop, 2006

Information Leaks and Privacy in Web Services Computing
A. Kundu
8th Annual CERIAS Symposium, 2006.

Secure dissemination of XML content using structure-based routing
A Kundu, B Elisa
Enterprise Distributed Object Computing Conference, 2006, pp. 153--164


2005

Building applications using end to end composition of web services
V. Agarwal, G. Chafle, K. Dasgupta, N. Karnik, A. Kumar, A. Kundu, A. Mediratta, S. Mittal, B. Srivastava
PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, pp. 1672, 2005

A service creation environment based on end to end composition of Web services
V. Agarwal, K. Dasgupta, N. Karnik, A. Kumar, A. Kundu, S. Mittal, B. Srivastava
Proceedings of the 14th international conference on World Wide Web, pp. 128--137, ACM, 2005


2004

A Service Creation Environment based on End to End Composition of Web Services
V Agarwal, K Dasgupta, N Karnik, A Kumar, A Kundu, S Mittal, B Srivastava, I Block
Technical Report, 2004

An authoring technology for multidevice Web applications
G. Banavar, L. Bergman, R. Cardone, V. Chevalier, Y. Gaeremynck, F. Giraud, C. Halverson, S. Hirose, M. Hori, F. Kitayama, G. Kondoh, A. Kundu, K. Ono, A. Schade, D. Soroker, K. Winz
IEEE Pervasive Computing 3(3), 83--93, Published by the IEEE Computer Society, 2004


2001

eUtopia: A Framework for Managing Web Utility Services
V. Naik, G. Pacifici, A. Tantawi, A. Youssef, M. Gowri, A. Kundu, P. Varma
OOPSLA Workshop on Object-Oriented Web Services, 2001

An Architecture for Virtual Server Farms
G Chafle, I Block, V Agarwal, N Karnik, A Kumar, A Kundu, J Shahabuddin, P Varma
Technical Report, IBM Research, 2001


2000

SSA-Based Partial Redundancy Elimination
A. Kundu
Masters Dissertation, Department of Computer Science, IIT Bombay: http://www.library.iitb.ac.in/%7Emnj/gsdl/cgi-bin/library?e=d-00000-00---0MTECH--00-1--0-10-0---0---0prompt-10---4-------0-1l--11-en-50---20-about---00-3-1-00-0011-1-0utfZz-8-00&cl=CL2&d=HASHf23e2b77215177c91aae, 2000


1999



Year Unknown

Information Leaks and Safe Web Services
Kundu, Ashish
pdfs.semanticscholar.org, 0
Abstract