|
Search the dblp DataBase
Carla Merkle Westphall:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Valério Rosset, Cleber Vinicios Filippin, Carla Merkle Westphall
A DRM Architecture to Distribute and Protect Digital Contents Using Digital Licenses. [Citation Graph (0, 0)][DBLP] AICT/SAPIR/ELETE, 2005, pp:422-427 [Conf]
- Alexandre Schulter, Kleber Vieira, Carlos Becker Westphall, Carla Merkle Westphall
Defending Grids Against Intrusions. [Citation Graph (0, 0)][DBLP] IWSOS/EuroNGI, 2006, pp:248-250 [Conf]
- Carla Merkle Westphall, Joni da Silva Fraga, Carlos Becker Westphall, S. C. S. Bianchi
Mandatory Security Policies for CORBA Security Model. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:251-262 [Conf]
- Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau Cheuk Lung
Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:263-274 [Conf]
- Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Lau Cheuk Lung
JaCoWeb Security - A CORBA Security Discretionary Prototype. [Citation Graph (0, 0)][DBLP] CLEI Electron. J., 2002, v:3, n:2, pp:- [Journal]
- Carla Merkle Westphall, Joni da Silva Fraga
Mandatory and Discretionary Policies for CORBA Security. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2005, v:13, n:3, pp:309-328 [Journal]
Self-Configuration Channel in the Wireless Networks. [Citation Graph (, )][DBLP]
Design and Evaluation of a Grid Computing Based Architecture for Integrating Heterogeneous IDSs. [Citation Graph (, )][DBLP]
A Security Framework for Input Validation. [Citation Graph (, )][DBLP]
Intrusion Detection for Computational Grids. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|