Carla Merkle Westphall

According to our database1, Carla Merkle Westphall authored at least 33 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Privacy Policies Model in Access Control.
Proceedings of the 2019 IEEE International Systems Conference, 2019

Mutual Authentication for IoT in the Context of Fog Computing.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

2017
Cloud identity management: A survey on privacy strategies.
Computer Networks, 2017

Improving OpenID Connect Federation's Interoperability with Web Semantics.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

A Design Towards Personally Identifiable Information Control and Awareness in OpenID Connect Identity Providers.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
A framework and risk assessment approaches for risk-based access control in the cloud.
J. Network and Computer Applications, 2016

A model for identity management with privacy in the cloud.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Towards Scalability for Federated Identity Systems for Cloud-Based Environments.
CLEI Electron. J., 2015

An Approach to IdM with Privacy in the Cloud.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A cyclical evaluation model of information security maturity.
Inf. Manag. Comput. Security, 2014

Privacy-preserving identity federations in the cloud: a proof of concept.
IJSN, 2014

Towards Scalability for Federated Identity Systems for Cloud-Based Environments.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

A dynamic risk-based access control architecture for cloud computing.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

2012
Environment, Services and Network Management for Green Clouds.
CLEI Electron. J., 2012

Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Proposal and development of the Web services input validation model.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2010
Intrusion Detection for Grid and Cloud Computing.
IT Professional, 2010

2009
Self-Configuration Channel in the Wireless Networks.
Proceedings of the Eighth International Conference on Networks, 2009

2008
A Security Framework for Input Validation.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Intrusion Detection for Computational Grids.
Proceedings of the NTMS 2008, 2008

2007
Design and Evaluation of a Grid Computing Based Architecture for Integrating Heterogeneous IDSs.
Proceedings of the Global Communications Conference, 2007

2006
Composition of a DIDS by integrating heterogeneous IDSs on grids.
Proceedings of the 4th international workshop on Middleware for grid computing, 2006

Defending Grids Against Intrusions.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

2005
Mandatory and Discretionary Policies for CORBA Security.
J. Network Syst. Manage., 2005

A DRM Architecture to Distribute and Protect Digital Contents Using Digital Licenses.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

2003
An Authentication for Non-Adjacent LSRs in the LDP.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

2002
Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Mandatory Security Policies for CORBA Security Model.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Integrating SSL to the JaCoWeb Security Framework: Project and Implementation.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
Um esquema de autorização para a segurança em sistemas distribuídos de larga escala.
PhD thesis, 2000

JaCoWeb Security - A CORBA Security Discretionary Prototype.
CLEI Electron. J., 2000

1999
A Large-scale System Authorization Scheme Proposal Integrating Java, CORBA and Web Security Models and a Discretionary Prototype.
Proceedings of the 1st Latin American Network Operations and Management Symposium, 1999

Authorization schemes for large-scale systems based on Java, CORBA and Web security models.
Proceedings of the IEEE International Conference on Networks 1999, 1999


  Loading...