default search action
Carla Merkle Westphall
Person information
- affiliation: Federal University of Santa Catarina, Brazil
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [d2]Fabricio Bortoluzzi, Lucas Silvero Beiler, Barry Irwin, Carla M. Westphall:
Cloud Telescope Internet Background Radiation August 2023. IEEE DataPort, 2024 - [d1]Fabricio Bortoluzzi, Lucas Silvero Beiler, Barry Irwin, Carla M. Westphall:
Cloud Telescope Internet Background Radiation May 2023. IEEE DataPort, 2024 - 2023
- [c32]Fabricio Bortoluzzi, Barry Irwin, Lucas Silvero Beiler, Carla Merkle Westphall:
Cloud Telescope: A distributed architecture for capturing Internet Background Radiation. CloudNet 2023: 77-85 - [c31]Cristian Alves dos Santos, Leandro Loffi, Carla Merkle Westphall:
Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities. ICISS 2023: 319-338 - 2022
- [j12]Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, Leandro Loffi, Carla Merkle Westphall, Guilherme Arthur Geronimo:
Intrusion detection and prevention in fog based IoT environments: A systematic literature review. Comput. Networks 214: 109154 (2022) - [c30]Rodolfo B. S. Carvalho, Carla Merkle Westphall, Caciano Machado:
An Extension of the Babel Protocol to Include Operating Cost: Providing Sustainability in Community Networks. ICCSA (1) 2022: 265-282 - [i3]Wesley dos Reis Bezerra, Cristiano Antonio de Souza, Carla Merkle Westphall, Carlos Becker Westphall:
Characteristics and Main Threats about Multi-Factor Authentication: A Survey. CoRR abs/2209.12984 (2022) - [i2]Wesley dos Reis Bezerra, Cristiano Antonio de Souza, Carla Merkle Westphall, Carlos Becker Westphall:
A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area. CoRR abs/2209.12985 (2022) - 2021
- [j11]Caciano Machado, Carla Merkle Westphall:
Blockchain incentivized data forwarding in MANETs: Strategies and challenges. Ad Hoc Networks 110: 102321 (2021) - [j10]Leandro Loffi, Carla Merkle Westphall, Lukas Derner Grüdtner, Carlos Becker Westphall:
Mutual authentication with multi-factor in IoT-Fog-Cloud environment. J. Netw. Comput. Appl. 176: 102932 (2021) - [c29]Caciano Machado, Renan R. S. dos Santos, Carla Merkle Westphall:
Hop-by-hop Accounting and Rewards for Packet dIspAtching. TrustCom 2021: 1116-1123 - [i1]Caciano Machado, Renan R. S. dos Santos, Carla Merkle Westphall:
Hop-by-hop Accounting and Rewards for Packet dIspAtching. CoRR abs/2108.09509 (2021) - 2020
- [c28]Rômulo Almeida, Carla M. Westphall:
Heuristic Phishing Detection and URL Checking Methodology Based on Scraping and Web Crawling. ISI 2020: 1-6
2010 – 2019
- 2019
- [c27]Leandro Loffi, Carla Merkle Westphall, Lukas Derner Grüdtner, Carlos Becker Westphall:
Mutual Authentication for IoT in the Context of Fog Computing. COMSNETS 2019: 367-374 - [c26]Jorge Werner, Carla Merkle Westphall, André Azevedo Vargas, Carlos Becker Westphall:
Privacy Policies Model in Access Control. SysCon 2019: 1-8 - 2018
- [c25]Lukas Derner Grüdtner, Leandro Loffi, Carlos Becker Westphall, Carla M. Westphall:
Autenticação mútua de nós sensores com nós intermediários para IoT no contexto de Fog Computing. SBRC Companion 2018 - 2017
- [j9]Jorge Werner, Carla Merkle Westphall, Carlos Becker Westphall:
Cloud identity management: A survey on privacy strategies. Comput. Networks 122: 29-42 (2017) - [c24]Rafael Weingärtner, Carla Merkle Westphall:
A Design Towards Personally Identifiable Information Control and Awareness in OpenID Connect Identity Providers. CIT 2017: 37-46 - [c23]Rafael Weingärtner, Pedro Henrique Pereira Martins, Ivan Luiz Salvadori, Carla Merkle Westphall, Frank Siqueira:
Improving OpenID Connect Federation's Interoperability with Web Semantics. AICCSA 2017: 1269-1276 - 2016
- [j8]Daniel Ricardo dos Santos, Roberto Marinho, Gustavo Roecker Schmitt, Carla Merkle Westphall, Carlos Becker Westphall:
A framework and risk assessment approaches for risk-based access control in the cloud. J. Netw. Comput. Appl. 74: 86-97 (2016) - [c22]Jorge Werner, Carla Merkle Westphall:
A model for identity management with privacy in the cloud. ISCC 2016: 463-468 - [c21]Jhonatan Alves, Carla Merkle Westphall, Gustavo Roecker Schmitt:
A Risk Calculus Extension to the XACML Language. SBSI 2016: 321-328 - 2015
- [j7]André Albino Pereira, João Bosco M. Sobral, Carla M. Westphall:
Towards Scalability for Federated Identity Systems for Cloud-Based Environments. CLEI Electron. J. 18(3): 2 (2015) - [c20]Jorge Werner, Carla Merkle Westphall, Rafael Weingärtner, Guilherme Arthur Geronimo, Carlos Becker Westphall:
An Approach to IdM with Privacy in the Cloud. CIT/IUCC/DASC/PICom 2015: 168-175 - 2014
- [j6]Daniel Ricardo dos Santos, Tiago Jaime Nascimento, Carla Merkle Westphall, Marcos Aurélio Pedroso Leandro, Carlos Becker Westphall:
Privacy-preserving identity federations in the cloud: a proof of concept. Int. J. Secur. Networks 9(1): 1-11 (2014) - [j5]Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo dos Santos, Carlos Becker Westphall:
A cyclical evaluation model of information security maturity. Inf. Manag. Comput. Secur. 22(3): 265-278 (2014) - [c19]Daniel Ricardo dos Santos, Carla Merkle Westphall, Carlos Becker Westphall:
A dynamic risk-based access control architecture for cloud computing. NOMS 2014: 1-9 - [c18]André Pereira, João Bosco M. Sobral, Carla M. Westphall:
Towards Scalability for Federated Identity Systems for Cloud-Based Environments. NTMS 2014: 1-5 - 2012
- [j4]Jorge Werner, Guilherme Arthur Geronimo, Carlos Becker Westphall, Fernando Luiz Koch, Rafael Freitas, Carla Merkle Westphall:
Environment, Services and Network Management for Green Clouds. CLEI Electron. J. 15(2) (2012) - [c17]Alexandre Gava Menezes, Carlos Becker Westphall, Carla Merkle Westphall, Eliel Marlon de Lima Pinto:
Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network. NOMS 2012: 603-606 - [c16]Rafael Bosse Brinhosa, Carla Merkle Westphall, Carlos Becker Westphall:
Proposal and development of the Web services input validation model. NOMS 2012: 643-646 - 2011
- [c15]Evandro Alencar Rigon, Carla Merkle Westphall:
Modelo de Avaliação da Maturidade da Segurança da Informação. SBSI 2011: 93-104 - 2010
- [j3]Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, Carla Merkle Westphall:
Intrusion Detection for Grid and Cloud Computing. IT Prof. 12(4): 38-43 (2010)
2000 – 2009
- 2009
- [c14]Eric Douglas Teixeira, Carlos Becker Westphall, Carla Merkle Westphall:
Self-Configuration Channel in the Wireless Networks. ICN 2009: 67-70 - 2008
- [c13]Alexandre Schulter, Kleber Vieira, Carlos Becker Westphall, Carla Merkle Westphall, Abderrahim Sekkaki:
Intrusion Detection for Computational Grids. NTMS 2008: 1-5 - [c12]Rafael Bosse Brinhosa, Carlos Becker Westphall, Carla Merkle Westphall:
A Security Framework for Input Validation. SECURWARE 2008: 88-92 - 2007
- [c11]Paulo F. Silva, Carlos Becker Westphall, Carla Merkle Westphall, Marcos Dias de Assunção:
Design and Evaluation of a Grid Computing Based Architecture for Integrating Heterogeneous IDSs. GLOBECOM 2007: 338-342 - 2006
- [c10]Alexandre Schulter, Kleber Vieira, Carlos Becker Westphall, Carla Merkle Westphall:
Defending Grids Against Intrusions. IWSOS/EuroNGI 2006: 248-250 - [c9]Paulo F. Silva, Carlos Becker Westphall, Carla Merkle Westphall, Marcos Dias de Assunção:
Composition of a DIDS by integrating heterogeneous IDSs on grids. MGC@Middleware 2006: 12 - 2005
- [j2]Carla Merkle Westphall, Joni da Silva Fraga:
Mandatory and Discretionary Policies for CORBA Security. J. Netw. Syst. Manag. 13(3): 309-328 (2005) - [c8]Valério Rosset, Cleber Vinicios Filippin, Carla Merkle Westphall:
A DRM Architecture to Distribute and Protect Digital Contents Using Digital Licenses. AICT/SAPIR/ELETE 2005: 422-427 - 2004
- [c7]Cleber Vinicios Filippin, Valério Rosset, Carla M. Westphall:
Distribuição de Direitos de Acesso e Licenças para o Gerenciamento de Conteúdos Digitais. SBSI 2004: 21-28 - 2003
- [c6]Morvan D. Müller, Carlos Becker Westphall, Carla Merkle Westphall:
An Authentication for Non-Adjacent LSRs in the LDP. LANOMS 2003: 21-28 - 2002
- [c5]Carla Merkle Westphall, Joni da Silva Fraga, Carlos Becker Westphall, S. C. S. Bianchi:
Mandatory Security Policies for CORBA Security Model. SEC 2002: 251-262 - [c4]Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau Cheuk Lung:
Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security. SEC 2002: 263-274 - 2001
- [c3]Michelle S. Wangham, Lau Cheuk Lung, Carla Merkle Westphall, Joni da Silva Fraga:
Integrating SSL to the JaCoWeb Security Framework: Project and Implementation. Integrated Network Management 2001: 779-792 - 2000
- [b1]Carla Merkle Westphall:
Um esquema de autorização para a segurança em sistemas distribuídos de larga escala. Federal University of Santa Catarina, Florianópolis, Brazil, 2000 - [j1]Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Lau Cheuk Lung:
JaCoWeb Security - A CORBA Security Discretionary Prototype. CLEI Electron. J. 3(2) (2000)
1990 – 1999
- 1999
- [c2]Carla Merkle Westphall, Joni da Silva Fraga:
Authorization schemes for large-scale systems based on Java, CORBA and Web security models. ICON 1999: 327-334 - [c1]Carla Merkle Westphall, Joni da Silva Fraga:
A Large-scale System Authorization Scheme Proposal Integrating Java, CORBA and Web Security Models and a Discretionary Prototype. LANOMS 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint