Intrusion detection for grid and cloud computing K Vieira, A Schulter, C Westphall, C Westphall It Professional 12 (4), 38-43, 2009 | 438 | 2009 |
Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth MAP Leandro, TJ Nascimento, DR dos Santos, CM Westphall, ... Proceedings of the Eleventh International Conference on Networks, 88-93, 2012 | 98 | 2012 |
A dynamic risk-based access control architecture for cloud computing DR Dos Santos, CM Westphall, CB Westphall 2014 IEEE network operations and management symposium (NOMS), 1-9, 2014 | 70 | 2014 |
A framework and risk assessment approaches for risk-based access control in the cloud DR dos Santos, R Marinho, GR Schmitt, CM Westphall, CB Westphall Journal of Network and Computer Applications 74, 86-97, 2016 | 65 | 2016 |
Cloud identity management: A survey on privacy strategies J Werner, CM Westphall, CB Westphall Computer Networks 122, 29-42, 2017 | 59 | 2017 |
Provisioning and resource allocation for green clouds GA Geronimo, J Werner, CB Westphall, CM Westphall, L Defenti 12th International Conference on Networks (ICN), 2013 | 41 | 2013 |
Customer security concerns in cloud computing SA de Chaves, B Carlos, CM Westphall, GA Gerônimo Proceedings of the Tenth International Conference on Networks (ICN), 7-11, 2011 | 37 | 2011 |
A cyclical evaluation model of information security maturity E Alencar Rigon, C Merkle Westphall, D Ricardo dos Santos, ... Information Management & Computer Security 22 (3), 265-278, 2014 | 36 | 2014 |
Blockchain incentivized data forwarding in MANETs: Strategies and challenges C Machado, CM Westphall Ad Hoc Networks 110, 102321, 2021 | 35 | 2021 |
Risk-based dynamic access control for a highly scalable cloud federation DR dos Santos, CM Westphall, CB Westphall Proc. Seventh Int. Conf. Emerg. Secur. Information, Syst. Technol …, 2013 | 34 | 2013 |
Intrusion detection and prevention in fog based IoT environments: A systematic literature review CA de Souza, CB Westphall, RB Machado, L Loffi, CM Westphall, ... Computer Networks 214, 109154, 2022 | 33 | 2022 |
Intrusion detection for computational grids A Schulter, K Vieira, C Westphall, C Westphall, S Abderrahim 2008 New Technologies, Mobility and Security, 1-5, 2008 | 33 | 2008 |
Mutual authentication with multi-factor in IoT-Fog-Cloud environment L Loffi, CM Westphall, LD Grüdtner, CB Westphall Journal of Network and Computer Applications 176, 102932, 2021 | 30 | 2021 |
A DRM architecture to distribute and protect digital contents using digital licenses V Rosset, CV Filippin, CM Westphall Advanced Industrial Conference on Telecommunications/Service Assurance with …, 2005 | 30 | 2005 |
Provisioning, resource allocation, and DVFS in green clouds GA Geronimo, J Werner, R Weingartner, CB Westphall, CM Westphall International Journal on Advances in Networks and Services 7 (1), 2014 | 25 | 2014 |
Modelo para Avaliação da Maturidade da Segurança da Informação EA Rigon | 23 | 2010 |
Current issues in cloud computing security and management PAF Vitti, DR dos Santos, CB Westphall, CM Westphall, KMM Vieira SECURWARE 2014, 47, 2014 | 22 | 2014 |
Authorization schemes for large-scale systems based on Java, CORBA and Web security models CM Westphall, JDS Fraga IEEE International Conference on Networks. ICON'99 Proceedings (Cat. No …, 1999 | 21 | 1999 |
A model for identity management with privacy in the cloud J Werner, CM Westphall 2016 IEEE Symposium on Computers and Communication (ISCC), 463-468, 2016 | 20 | 2016 |
Integrating SSL to the JACOWEB security framework: Project and Implementation MS Wangham, LC Lung, CM Westphall, JS Fraga 2001 IEEE/IFIP International Symposium on Integrated Network Management …, 2001 | 20 | 2001 |