Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vincent R. Scarlata is active.

Publication


Featured researches published by Vincent R. Scarlata.


Archive | 2008

TPM Virtualization: Building a General Framework

Vincent R. Scarlata; Carlos V. Rozas; Monty Wiseman; David W. Grawrock; Claire Vishik

Trusted Computing has been widely recognized as a useful and necessary extension of more traditional security mechanisms. In today’s complex multi-device environment, it is essential to be assured that devices participating in transactions can be trusted. The Trusted Computing Group (TCG) has created a set of specifications and accompanying infrastructure defining means of assurance necessary to build a trusted environment. Continuing interest in virtualization as a way to extend flexibility in diverse computing environments while addressing issues of underutilization of equipment and energy consumption brings additional complexities to current and future models of trusted computing.


local computer networks | 2011

SACM: Stateful Access Control Model

André L. M. dos Santos; Vincent R. Scarlata; Anderson C. Lima; Inacio C. Alves; Davi di C. Sampaio

Access control mechanisms are a fundamental building block in the construction of secure computing environments; however, most of the research in this area has been spent on traditional access control needs. These models were sufficient in classical computing systems such as databases and file systems, but as we continue to find new and innovative ways to utilize mobile computing systems these approaches are becoming inadequate. The primary difference between many of these new policies and traditional policies is the need to maintain state across transactions. An example of such a policy is a printer kiosk that allows printing only if the traveler has not printed more than some n pages. Currently, systems with these types of needs are controlled by ad-hoc, custom designed systems, rather than a generalized access control model that is able to express them. Traditional models also typically lack the ability to dynamically change. That is, traditional rule sets cannot express policies that require rules to be capable of creating new rules, or deleting old rules. The ability to dynamically produce and delete rules allows for an additional degree of state to be stored in the model. In this paper, we present the Stateful Access Control Model (SACM), which is designed specifically for these new paradigms and provides both these new capabilities. It supports usage in traditional centralized systems where access control information is stored on a computer, as well as a new approach where access rules are distributed across mobile devices.


computational science and engineering | 2013

SACM: Stateful Access Control Model a More Detailed Approach

André L. M. dos Santos; Joaquim Celestino; Vincent R. Scarlata; Anderson C. Lima; Inacio C. Alves; Davi di C. Sampaio

Access control mechanisms are a fundamental building block in the construction of secure computing environments; however, most of the research in this area has been spent on traditional access control needs. These models were sufficient in classical computing systems such as databases and file systems, but as we continue to find new and innovative ways to utilize mobile computing systems these approaches are becoming inadequate. The primary difference between many of these new policies and traditional policies is the need to maintain state across transactions. Currently, systems with these types of needs are controlled by ad-hoc, custom designed systems, rather than a generalized access control model that is able to express them. Traditional models also typically lack the ability to dynamically change. That is, traditional rule sets cannot express policies that require rules to be capable of creating new rules, or deleting old rules. The ability to dynamically produce and delete rules allows for an additional degree of state to be stored in the model. In this paper, we present the Stateful Access Control Model (SACM), which is designed specifically for these new paradigms and provides both these new capabilities. It supports usage in traditional centralized systems where access control information is stored on a computer, as well as a new approach where access rules are distributed across mobile devices. We then exhibit the versatility of this model by expressing a wide range of different types of policies and finished demonstrating the models implementation developed in JAVA.


Archive | 2004

Method and apparatus for providing secure virtualization of a trusted platform module

Vincent R. Scarlata; Carlos V. Rozas


Archive | 2015

Method and apparatus for remotely provisioning software-based security coprocessors

Vincent R. Scarlata


Archive | 2005

Method and apparatus for providing software-based security coprocessors

Vincent R. Scarlata; Carlos V. Rozas


Archive | 2010

Technique for Supporting Multiple Secure Enclaves

Simon Johnson; Uday Savagaonkar; Vincent R. Scarlata; Francis X. McKeen; Carlos V. Rozas


Archive | 2006

Method and apparatus for migrating virtual trusted platform modules

Vincent R. Scarlata


Archive | 2006

Mechanisms to control access to cryptographic keys and to attest to the approved configurations of computer platforms

Vincent R. Scarlata


Archive | 2013

SYSTEM AND METHOD FOR IMPLEMENTING A TRUSTED DYNAMIC LAUNCH AND TRUSTED PLATFORM MODULE (TPM) USING SECURE ENCLAVES

Simon Johnson; Vincent R. Scarlata; Willard M. Wiseman

Collaboration


Dive into the Vincent R. Scarlata's collaboration.

Researchain Logo
Decentralizing Knowledge