Carlos Becker Westphall
Carlos Becker Westphall
Professor of Computer Science, Federal University of Santa Catarina
Verified email at - Homepage
Cited by
Cited by
A cloud computing solution for patient's data collection in health care institutions
CO Rolim, FL Koch, CB Westphall, J Werner, A Fracalossi, GS Salvador
Second International Conference on eHealth, Telemedicine, and Social …, 2010
Intrusion detection for grid and cloud computing
K Vieira, A Schulter, CB Westphall, CM Westphall
IEEE IT Professional 12 (4), 38-43, 2010
Toward an architecture for monitoring private clouds
SA De Chaves, RB Uriarte, CB Westphall
IEEE Communications Magazine 49 (12), 130-137, 2011
Sla perspective in security management for cloud computing
SA de Chaves, CB Westphall, FR Lamin
Sixth International Conference on Networking and Services (ICNS), 2010, 212-217, 2010
Cloud resource management: A survey on forecasting and profiling models
R Weingärtner, GB Bräscher, CB Westphall
Journal of Network and Computer Applications 47, 99-106, 2015
Hybrid approach to intrusion detection in fog-based IoT environments
CA De Souza, CB Westphall, RB Machado, JBM Sobral, ...
Computer Networks 180, 107417, 2020
Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth
MAP Leandro, TJ Nascimento, DR dos Santos, CM Westphall, ...
Proceedings of the Eleventh International Conference on Networks, 88-93, 2012
A dynamic risk-based access control architecture for cloud computing
DR Dos Santos, CM Westphall, CB Westphall
2014 IEEE network operations and management symposium (NOMS), 1-9, 2014
A framework and risk assessment approaches for risk-based access control in the cloud
DR dos Santos, R Marinho, GR Schmitt, CM Westphall, CB Westphall
Journal of Network and Computer Applications 74, 86-97, 2016
Cloud identity management: A survey on privacy strategies
J Werner, CM Westphall, CB Westphall
Computer Networks 122, 29-42, 2017
Analyzing the strength of Pell’s RSA
C Thirumalai, M Senthilkumar, R Silambarasan, CB Westphall
IJPT 8 (4), 21869-21874, 2016
Decentralized network management using distributed artificial intelligence
FL Koch, CB Westphall
Journal of Network and Systems Management 9 (4), 375-388, 2001
Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments
CA De Souza, CB Westphall, RB Machado
Computers & Electrical Engineering 98, 107694, 2022
Provisioning and resource allocation for green clouds
GA Geronimo, J Werner, CB Westphall, CM Westphall, L Defenti
12th International Conference on Networks (ICN), 2013
Performance evaluation for proactive network management
AS Morales De Franceschi, LF Kormann, CB Westphall
IEEE International Conference on Communications, 1996. ICC 96. 1, 22-26 vol. 1, 1996
Analyzing the strength of Pell's RSA
T Chandrasegar, M Senthilkumar, R Silambarasan, CB Westphall
IJPT 8 (4), 21869-21874, 2016
Grid-M: Middleware to integrate mobile devices, sensors and grid computing
HA Franke, FL Koch, CO Rolim, CB Westphall, DO Balen
International Conference on Wireless and Mobile Communications (ICWMC'07), 19-24, 2007
A cyclical evaluation model of information security maturity
E Alencar Rigon, C Merkle Westphall, D Ricardo dos Santos, ...
Information Management & Computer Security 22 (3), 265-278, 2014
Customer Security Concerns in Cloud Computing
SA Chaves, CB Westphall, CM Westphall, GA Geronimo
ICN 2011, The Tenth International Conference on Networks, 7-11, 2011
Risk-based dynamic access control for a highly scalable cloud federation
DR dos Santos, CM Westphall, CB Westphall
7th International Conference on Emerging Security Information Systems and …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20