Vincent R. Scarlata
Intel
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Vincent R. Scarlata.
Archive | 2008
Vincent R. Scarlata; Carlos V. Rozas; Monty Wiseman; David W. Grawrock; Claire Vishik
Trusted Computing has been widely recognized as a useful and necessary extension of more traditional security mechanisms. In today’s complex multi-device environment, it is essential to be assured that devices participating in transactions can be trusted. The Trusted Computing Group (TCG) has created a set of specifications and accompanying infrastructure defining means of assurance necessary to build a trusted environment. Continuing interest in virtualization as a way to extend flexibility in diverse computing environments while addressing issues of underutilization of equipment and energy consumption brings additional complexities to current and future models of trusted computing.
local computer networks | 2011
André L. M. dos Santos; Vincent R. Scarlata; Anderson C. Lima; Inacio C. Alves; Davi di C. Sampaio
Access control mechanisms are a fundamental building block in the construction of secure computing environments; however, most of the research in this area has been spent on traditional access control needs. These models were sufficient in classical computing systems such as databases and file systems, but as we continue to find new and innovative ways to utilize mobile computing systems these approaches are becoming inadequate. The primary difference between many of these new policies and traditional policies is the need to maintain state across transactions. An example of such a policy is a printer kiosk that allows printing only if the traveler has not printed more than some n pages. Currently, systems with these types of needs are controlled by ad-hoc, custom designed systems, rather than a generalized access control model that is able to express them. Traditional models also typically lack the ability to dynamically change. That is, traditional rule sets cannot express policies that require rules to be capable of creating new rules, or deleting old rules. The ability to dynamically produce and delete rules allows for an additional degree of state to be stored in the model. In this paper, we present the Stateful Access Control Model (SACM), which is designed specifically for these new paradigms and provides both these new capabilities. It supports usage in traditional centralized systems where access control information is stored on a computer, as well as a new approach where access rules are distributed across mobile devices.
computational science and engineering | 2013
André L. M. dos Santos; Joaquim Celestino; Vincent R. Scarlata; Anderson C. Lima; Inacio C. Alves; Davi di C. Sampaio
Access control mechanisms are a fundamental building block in the construction of secure computing environments; however, most of the research in this area has been spent on traditional access control needs. These models were sufficient in classical computing systems such as databases and file systems, but as we continue to find new and innovative ways to utilize mobile computing systems these approaches are becoming inadequate. The primary difference between many of these new policies and traditional policies is the need to maintain state across transactions. Currently, systems with these types of needs are controlled by ad-hoc, custom designed systems, rather than a generalized access control model that is able to express them. Traditional models also typically lack the ability to dynamically change. That is, traditional rule sets cannot express policies that require rules to be capable of creating new rules, or deleting old rules. The ability to dynamically produce and delete rules allows for an additional degree of state to be stored in the model. In this paper, we present the Stateful Access Control Model (SACM), which is designed specifically for these new paradigms and provides both these new capabilities. It supports usage in traditional centralized systems where access control information is stored on a computer, as well as a new approach where access rules are distributed across mobile devices. We then exhibit the versatility of this model by expressing a wide range of different types of policies and finished demonstrating the models implementation developed in JAVA.
Archive | 2004
Vincent R. Scarlata; Carlos V. Rozas
Archive | 2015
Vincent R. Scarlata
Archive | 2005
Vincent R. Scarlata; Carlos V. Rozas
Archive | 2010
Simon Johnson; Uday Savagaonkar; Vincent R. Scarlata; Francis X. McKeen; Carlos V. Rozas
Archive | 2006
Vincent R. Scarlata
Archive | 2006
Vincent R. Scarlata
Archive | 2013
Simon Johnson; Vincent R. Scarlata; Willard M. Wiseman