Carlos Becker Westphall

According to our database1, Carlos Becker Westphall authored at least 66 papers between 1993 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Cloud identity management: A survey on privacy strategies.
Computer Networks, 2017

Improving Cloud Computing Virtual Machines Balancing through Hosts and Virtual Machines Similarities.
Proceedings of the 2017 IEEE World Congress on Services, 2017

2016
A framework and risk assessment approaches for risk-based access control in the cloud.
J. Network and Computer Applications, 2016

A Distributed Autonomic Management Framework for Cloud Computing Orchestration.
Proceedings of the IEEE World Congress on Services, 2016

Order@Cloud: A VM organisation framework based on multi-objectives placement ranking.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Cloud resource management: A survey on forecasting and profiling models.
J. Network and Computer Applications, 2015

An Approach to IdM with Privacy in the Cloud.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A cyclical evaluation model of information security maturity.
Inf. Manag. Comput. Security, 2014

Privacy-preserving identity federations in the cloud: a proof of concept.
IJSN, 2014

Panoptes: A monitoring architecture and framework for supporting autonomic Clouds.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A dynamic risk-based access control architecture for cloud computing.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

2012
Environment, Services and Network Management for Green Clouds.
CLEI Electron. J., 2012

Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Proposal and development of the Web services input validation model.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Toward an architecture for monitoring private clouds.
IEEE Communications Magazine, 2011

Simulator improvements to validate the Green Cloud Computing approach.
Proceedings of the 7th Latin American Network Operations and Management Symposium, 2011

2010
Management of Security and Security for Management Systems.
J. Network Syst. Manage., 2010

Analytical Model to Evaluate the Performance of Mobile Agents in a Generic Network Topology.
J. Network Syst. Manage., 2010

Intrusion Detection for Grid and Cloud Computing.
IT Professional, 2010

A Cloud Computing Solution for Patient's Data Collection in Health Care Institutions.
Proceedings of the Second International Conference on eHealth, 2010

2009
Self-Configuration Channel in the Wireless Networks.
Proceedings of the Eighth International Conference on Networks, 2009

2008
Pervasive Management for Ubiquitous Networks and Services - Report on NOMS 2008.
J. Network Syst. Manage., 2008

A Security Framework for Input Validation.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Intrusion Detection for Computational Grids.
Proceedings of the NTMS 2008, 2008

Towards Advance Reservation in Large-Scale Grids.
Proceedings of the Third International Conference on Systems, 2008

User Maturity Based Trust Management for Grid Computing.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

A Price-Based Task Scheduling for Grid Computing.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Improvements in the model for interoperability of intrusion detection responses compatible with the IDWG model.
Int. Journal of Network Management, 2007

Design and Evaluation of a Grid Computing Based Architecture for Integrating Heterogeneous IDSs.
Proceedings of the Global Communications Conference, 2007

2006
Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

An Intrusion Answer Model Compatible with the Alerts IDWG Model.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Towards Grid-based Intrusion Detection.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Towards a Middleware for Mobile Grids.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Composition of a DIDS by integrating heterogeneous IDSs on grids.
Proceedings of the 4th international workshop on Middleware for grid computing, 2006

A Grid-based Intrusion Detection System.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Grid Middleware for Mobile Decision Support Systems.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

An Architecture to Provide QoS in Web Services.
Proceedings of IEEE International Conference on Communications, 2006

Defending Grids Against Intrusions.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

Towards a Grid of Sensors for Telemedicine.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

Security Approaches for Cluster Interconnection in a Wireless Sensor Network.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
Distribution of Network Management Policies with Emphasis on Quality of Service.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

Performance Analysis and Service Differentiation in the MAC SubLayer of IEEE 802.11e Ad Hoc Networks.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

2004
Grids of agents for computer and telecommunication network management.
Concurrency - Practice and Experience, 2004

Distributed Artificial Intelligence for Network Management Systems ? New Approaches.
Proceedings of the First International Workshop, 2004

2003
Extending TINA with Secure On-Line Accounting Services.
J. Network Syst. Manage., 2003

Grids of Agents for Computer and Telecommunication Network Management.
Proceedings of the International Middleware Conference, 2003

Automations in Computer Network Management Utilizing Computational Intelligence.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

An Authentication for Non-Adjacent LSRs in the LDP.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

2002
Mandatory Security Policies for CORBA Security Model.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Quality of Service for Ad Hoc Wireless Network.
Proceedings of the 22nd International Conference of the Chilean Computer Science Society (SCCC 2002), 2002

2001
Decentralized Network Management Using Distributed Artificial Intelligence.
J. Network Syst. Manage., 2001

Development of a Prototype Based on TINA Accounting and Security Management Architecture.
Proceedings of the 21st International Conference of the Chilean Computer Science Society (SCCC 2001), 2001

Using Fuzzy Specifications to Manage QoS.
Proceedings of the 2nd Latin American Network Operations and Management Symposium, 2001

Development of a Prototype based on TINA Accounting Management Architecture.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

Development of Accounting Management Based Service Environment in Tina, Java and Corba Architectures.
Proceedings of the Networking, 2001

Security within TINA accounting architecture management.
Proceedings of the IEEE International Conference on Communications, 2001

Accounting management based service environment in a TINA architecture.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Distributed Network Management Using SNMP, Java, WWW, and CORBA.
J. Network Syst. Manage., 2000

1999
Wireless communications: security management against cloned cellular phones.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

TMN Distributed Management with CORBA: A Experience in Alarm Surveillance.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Security management against cloned cellular telephones.
Proceedings of the IEEE International Conference on Networks 1999, 1999

1997
Formal design of a telecommunications networks management system.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Proactive network management using remote monitoring and artificial intelligence techniques.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Proactive Management of Computer Networks Using Artificial Intelligence Agents and Techniques.
Proceedings of the Integrated Network Management V, 1997

1996
OSI Usage Metering Function for the OSIMIS Management Platform.
J. Network Syst. Manage., 1996

1993
Management in Broadband Networks: ATM Networks Fault Management.
Proceedings of the Advanced Information Processing Techniques for LAN and MAN Management, 1993


  Loading...