Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Milton H. Hernandez is active.

Publication


Featured researches published by Milton H. Hernandez.


network operations and management symposium | 2012

Privileged identity management in enterprise service-hosting environments

Kumar Bhaskaran; Milton H. Hernandez; Jim Laredo; Laura Z. Luan; Yaoping Ruan; Maja Vukovic; Paul Driscoll; Daniel Miller; Alan Skinner; Girish B. Verma; Prema Vivekanandan; Leanne Chen; Gregory Gaskill

IAM needs will only grow as devices, servers, and end points continue to increase . Current schemes are not sustainable as the number of IDs will explode. Environment is heterogeneous, and constantly adding new systems including Cloud. Our solution offers a platform where a user gets an individual user ID on a system - but only if they need it, when they need it, for only as long as they need it . Reusable ID scheme reduces the number of IDs in the system yielding cost savings on lifecycle management activities, improved security compliance . A compliance readiness platform can be enabled to prevent, flag, or monitor questionable access in or near real-time . Provide easily accessible logs to prove compliance policies.


ieee international conference on services computing | 2012

Hybrid Role Mining for Security Service Solution

Supreet Reddy Mandala; Maja Vukovic; Jim Laredo; Yaoping Ruan; Milton H. Hernandez

IT services delivery is a complex ecosystem that engages 100000s of system administrators in service delivery centers globally managing 1000s of IT systems on behalf of customers. Such large-scale hosting environments require a flexible identity management system to provision necessary access rights, in order to ensure compliance posture of an organization. A popular and effective access control scheme is Role Based Access Control (RBAC). Ideally, a role should correspond to a business function performed within an enterprise. Several role mining algorithms have been proposed which attempt to automate the process of role discovery. In this paper, we represent the user-permission assignments as a bi-partite graph with users/permissions as vertices and user-permission assignments as edges. Given a user-permission bi-partite graph, most role mining algorithms focus on discovering roles that cover all the user-permission assignments. We show that by relaxing the coverage requirement, one can improve the accuracy of role detection. We propose a parameterized definition of a role based on graph theoretical properties, and demonstrate that the role parameters can be controlled to balance the accuracy and coverage of the roles detected. Finally, we propose a heuristic to illustrate the efficacy of our approach and validate it on real and artificial organizational access control data.


network operations and management symposium | 2012

Integrated user activity monitoring for regulatory services

Mattias Marder; Kumar Bhaskaran; Milton H. Hernandez; Jim Laredo; Daniela Rosu; Yaoping Ruan; Paul Driscoll; Alan Skinner

Regulations such as FFIEC [5] and HIPAA [6] require activities of system administration to be captured and reviewed regularly. In IT service delivery environment, system maintenance activities are usually performed by the service provider whose system administrators access customer environment based on problem and change ticket being assigned.


Archive | 2010

Methods and Apparatus for Role-Based Shared Access Control to a Protected System Using Reusable User Identifiers

Evelyn R. Anderson; Mohit Chugh; Milton H. Hernandez; Martin McLaughlin; Karthik Subramanian; Prema Vivekanandan


Archive | 2006

Method and system for capturing and reusing intellectual capital in IT management

Milton H. Hernandez; Gopal Pingali; Prashant Pradhan


Archive | 2013

Service compliance enforcement using user activity monitoring and work request verification

Milton H. Hernandez; Jim Laredo; Mattias Marder; Yaoping Ruan; Nandagopal Seshagiri


Archive | 2006

Method and system for developing an accurate skills inventory using data from delivery operations

Milton H. Hernandez; Gopal Pingali; Prashant Pradhan


Archive | 2012

ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT

Lawrence D. Bergman; Kumar Bhaskaran; Winnie Cheng; Robert Alan Flavin; Milton H. Hernandez; Hai Huang; Ravi B. Konuru; Yaoping Ruan; Sambit Sahu


Archive | 2011

Hybrid role mining

Milton H. Hernandez; Jim Laredo; Supreet Reddy Mandala; Yaoping Ruan; Vugranam C. Sreedhar; Maja Vukovic


Archive | 2008

Method for annotating a process

Milton H. Hernandez; Hani Jamjoom; Arjun Natarajan; Thirumal Nellutla; Sreeram Ramakrishnan; Debanjan Saha; Ramendra K. Sahoo; Anees Shaikh; Mithkal M. Smadi

Researchain Logo
Decentralizing Knowledge