Jonathan Agre - Brinklow MD, US Lusheng Ji - Randolph NJ, US Prabha Ramachandran - Falls Church VA, US
Assignee:
Fujitsu Limited - Kawasaki
International Classification:
G06F 15/173 G06F 15/16
US Classification:
709229, 709225
Abstract:
A security management approach that combines network security management with application layer or software service security to address the threat of internal network security attacks. The invention is directed to a method for enhancing network security on a computer network. Data access privileges relating to users and services are interpreted, network access rules are determined based on the interpreted privileges, and network message traffic is monitored and filtered based on the determined network access rules. The interpreting, determining, monitoring, and filtering are performed at a network layer responsible for controlling how a network device gains access to the network, such as the Media Access Control (MAC) layer.
Goldman Sachs
Vice President - Securities Lending Technology
Goldman Sachs Mar 2007 - Sep 2017
Vice President - Risk Technology
Sapient Nov 2004 - Mar 2007
Senior Associate, Technology
Fujitsu Jan 2004 - Nov 2004
Internship
Education:
The Wharton School 2012 - 2014
Master of Business Administration, Masters
University of Maryland Aug 2003
Master of Science, Masters
Florida State University May 2003
Institute of Technology May 2001
Bachelors
Delhi Public School, Rk Puram
Institute of Technology, Bhu
Bachelors, Bachelor of Technology, Electrical Engineering
Indian Institute of Technology (Banaras Hindu University), Varanasi
Bachelors, Bachelor of Technology, Electrical Engineering
Delhi Public School
University of Maryland
Masters, Computer Engineering
Skills:
Mathematics Jms Pools Ibm Interrupts Limitations Books Manchester New Ideas Vendors Windows Conventional Dynamic Balancing Perl Redcine X Matlab Authentication Students Oracle Database Processors Translation Access Control Hp Quality Center Struts Thesis Network Topology Design Review Apis Linear Algebra Network Security Delhi Mdb Prediction Detection Adhoc Florida Decoding Requirements Gathering Management Atlas Design User Interface Design Science Security Mars Information Assurance Broadcast Jsp Use Case Database Security Publications Source Requirements Analysis Linux Ad Hoc Networks Finalist Collaborative Execution Methodology Algorithms Trees Websphere Networking Languages System Business Services Disciplinary Integration Testing Bangalore Variation Validation Flat Patterning Defect Internet Protocols Ubiquitous Computing Risc Talent Management Testing Encryption Beans Offshore Training Modulation Enterprise Software Code Review Radio Subject Matter Expert Ieee Delegate Design Documents Project Management Research Jdbc R&D Written Shell Scripting Gui Systems Design Concepts Information Security Threads Test Planning Precise C Business Applications Buffer Fix Protocol Operating Systems Number Theory Applications Network Design Specs Interfacing Test Estimation Communication Detail Tcp Verilog Searching Quality Assurance Scheme Fujitsu Workshops Software Testing Latex Facade Virtual Memory Tcm Bootstrap Assembler Network Administration Electrical Engineering Voting Indian Technology Consulting Project Planning Ns 2 Data Access Data Driven Testing Project Software Development Life Cycle Aes Routing Protocols Java Enterprise Edition Forwarding Covering Soho Simple Falls Church Responsibility Synchronization Ejb Multicast Sequence Diagrams Nac Camp Software Design Code Socket Programming Lead Development Efficient Wireless Security Hev Army Unit Testing Javabeans Sprint Microsoft Exchange Reviews Business Process Re Engineering Connectivity Class Diagrams Software Satellite Frame Java India Rate Network Communications Web Services Test Strategy Platforms Network Simulator Queues Task Management Ifrs Staff Development Real Analysis Software Development Meetings Combat Computer Engineering Architecture Bridge Databases