Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sharada Sundaram is active.

Publication


Featured researches published by Sharada Sundaram.


ieee computer security foundations symposium | 2007

Privacy and Utility in Business Processes

Adam Barth; John C. Mitchell; Anupam Datta; Sharada Sundaram

We propose an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy policy compliance and audit. In our model, agents that send and receive tagged personal information are assigned organizational roles and responsibilities. We present approaches and algorithms for determining whether a business process design simultaneously achieves privacy and the goals of the organization (utility). The model also allows us to develop a notion of minimal exposure of personal information, for a given process. We investigate the problem of auditing with inexact information and develop methods to identify a set of potentially culpable individuals when privacy is breached. The audit methods draw on traditional causality concepts to reduce the effort needed to search audit logs for irresponsible actions.


trust and privacy in digital business | 2009

A Formalization of HIPAA for a Medical Messaging System

Peifung E. Lam; John C. Mitchell; Sharada Sundaram

The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance systems. We believe that in some applications, it may be practical to support compliance by using formalized portions of applicable laws to regulate business processes that use information systems. In order to explore this possibility, we use a stratified fragment of Prolog with limited use of negation to formalize a portion of the US Health Insurance Portability and Accountability Act (HIPAA). As part of our study, we also explore the deployment of our formalization in a prototype hospital Web portal messaging system.


international health informatics symposium | 2012

Declarative privacy policy: finite models and attribute-based encryption

Peifung E. Lam; John C. Mitchell; Andre Scedrov; Sharada Sundaram; Frank Wang

Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeholder understanding of complex policies and improved systems that impose policy restrictions on access and transmission of EHI. Building on prior work formalizing privacy laws as logic programs, we prove that for any privacy policy that conforms to patterns evident in HIPAA, there exists a finite representative hospital database that illustrates how the law applies in all possible hospitals. This representative illustrative example can support new education, new policy development, and new policy debugging tools. Addressing the need for secure transmission of usable EHI, we show how policy formalized as a logic program can also be used to automatically generate a form of access control policy used in Attribute-Based Encryption (ABE). This approach, testable using our representative hospital model, makes it possible to share policy-encrypted data on untrusted cloud servers, or send strategically encrypted data across potentially insecure networks. As part of our study, we built a prototype to secure Health Information Exchange (HIE), with automatically generated ABE policies, and measure its performance.


international colloquium on theoretical aspects of computing | 2012

Data privacy using MASKETEER

Sachin Lodha; Nikhil Patwardhan; Ashim Roy; Sharada Sundaram; Dilys Thomas

Advances in storage, networks, and hardware technology have resulted in an explosion of data and given rise to multiple sources of overlapping data. This, combined with general apathy towards privacy issues while designing systems and processes, leads to frequent breaches in personal identity and data security. What makes this worse is that many of these breaches are committed by the legitimate users of the data. Major countries like the U.S., Japan, Canada, Australia and EU have come up with strict data distribution laws which demand their organizations to implement proper data security measures that respect personal privacy and prohibit dissemination of raw data outside the country. Since companies are not able to provide real data, they often resort to completely random data. It is obvious that such a data would offer complete privacy, but would have very low utility. This has serious implications for an IT services company like Tata Consultancy Services Ltd. (TCS), since application development and testing environments rely on realistic test data to verify that the applications provide the functionality and reliability they were designed to deliver. It is always desirable that the test data is similar to, if not the same as, the production data. Hence, deploying proven tools that make de-identifying production data easy, meaningful and cost-effective is essential. Data masking methods came into existence to permit the legitimate use of data and avoid misuse. In this paper, we consider various such techniques to come up with a comprehensive solution for data privacy requirements. We present a detailed methodology and solutions for enterprise-wide masking. We also present the data masking product MASKETEERTM, developed at TCS, which implements these techniques for providing maximum privacy for data while maintaining good utility.


Archive | 2012

Techniques for Providing Access to Data in Dynamic Shared Accounts

Sharada Sundaram; Robert Koeten


Archive | 2012

Providing dynamically shared cloud accounts

Sharada Sundaram; Sanjay Sawhney; Robert Koeten


Archive | 2014

Systems and methods for searching shared encrypted files on third-party storage systems

Scott Schneider; Walter Bogorad; Haibin Zhang; Sharada Sundaram


Archive | 2012

Protecting user identity at a cloud using a distributed user identity system

Sharada Sundaram; Robert Koeten


Archive | 2011

Techniques for providing role-based access control using dynamic shared accounts

Sharada Sundaram; Sanjay Sawhney; Robert Koeten


Archive | 2011

Techniques for identifying potential malware domain names

Michael Hart; Jeffrey Wilhelm; Sharada Sundaram

Collaboration


Dive into the Sharada Sundaram's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Haibin Zhang

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andre Scedrov

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Anupam Datta

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge