Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output
Research articles in refereed specialist journals:
Granova A, Eloff JHP: 2005. A legal overview of phishing. Computer Fraud and Security, / Jul, pp 6-11.
Eloff JHP, Eloff MM: 2005. Information security architecture. Computer Fraud and Security, 11 / Nov, pp 10-16.
Coetzee M, Eloff JHP: 2005. An access control framework for web services. Information Management and Computer Security, 13 (1), Emerald Group Publishing Limited, pp 29-38.
Coetzee M, Eloff JHP: 2005. Autonomous trust for web services. Internet Research-Electronic Networking Applications and Policy, 15 (5), pp 498-507.
Olivier MS: 2005. Flocks: Distributed Proxies for Browsing Privacy. South African Computer Journal, 34 / Jun, pp 33-40.
Papers in refereed, published conference proceedings:
Fei K, Eloff JHP, Venter HS, Olivier MS: 2005. Exploring Forensic Data with Self-Organizing Maps. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 113-123.
Olivier MS: 2005. Forensics and Privacy-Enhancing Technologies. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 17-31.
Laubscher R, Rabe D, Olivier MS, Eloff JHP, Venter HS: 2005. Applying Forensic Principles to Computer-Based Assessment. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 105-112.
Morkel T, Olivier MS, Eloff JHP, Venter HS: 2005. One-Time Passwords in a Mobile Environment using Steganography. In Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Diavlos Publications, pp 13-19.
Croft NJ, Olivier MS, Venter HS: 2005. Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks. In Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Diavlos Publications, pp 85-91.
Smith E, Eloff JHP: 2005. A new perspective on Risk Assessment Techniques. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 227-234.
Slaviero ML, Olivier MS: 2005. Choosing a Deterministic function for use with DAOMAP, the Distributed Allocation Of Multicast Addresses Protocol. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 105-112.
Croft NJ, Olivier MS: 2005. Using compatible keys in achieving subscriber privacy channelling for billing in GSM Networks. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 245-252.
Tillwick H, Neumann T, Olivier MS, Venter HS, Eloff JHP: 2005. Polar: Proxies collaborating to achieve anonymous web browsing. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 317-324.
Venter HS, Olivier MS, Eloff JHP, Botes ME: 2005. Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 377-384.
Coetzee M, Eloff JHP: 2005. Autonomous Trust for Web Services. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 217-225.
Loock M, Eloff JHP: 2005. Investigating the usage of the Chinese Wall Security Policy model for Data Mining. In Proceedings of the Fourth International Symposium on Information and Communication Technologies, Computer Science Press, pp 243-248.
Oberholzer HJG, Olivier MS: 2005. Privacy Contracts as an Extension of Privacy Policies. In Proceedings of the International Workshop on Privacy Data Management (PDM 2005), IEEE, pp 11-19.
Coetzee M, Eloff JHP: 2005. Metadata for trust in service-oriented architectures. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-11 (CD).
Izadinia VD, Kourie DG, Eloff JHP: 2005. Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-14 (CD).
Loock M, Eloff JHP: 2005. A new Access Control model based on the Chinese Wall Security Policy Model. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-10 (CD).
Morkel T, Eloff JHP, Olivier MS: 2005. An overview of image steganography. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-11 (CD).
Slaviero ML, Kroon J, Olivier MS: 2005. Attacking Signed Binaries. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-10 (CD).
Grant TJ: 2005. Unifying Planning and Control using an OODA-based Architecture. In Research for a Changing World - Proceedings of SAICSIT 2005, SAICSIT, pp 159-170.
Olivier MS: 2005. Distributed Proxies for Browsing Privacy - A Simulation of Flocks. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 104-112.
Tillwick H, Olivier MS: 2005. Towards a Framework for Connection Anonymity. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 113-122.
Laubscher R, Olivier MS, Venter HS, Eloff JHP, Rabe DJ: 2005. The Role of Key Loggers in Computer-based Assessment Forensics. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 123-130.
Croft NJ, Olivier MS: 2005. Using an approximated One-Time Pad to Secure Short Messaging Service (SMS). In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 71-76.
Delport JP, Olivier MS: 2005. Detecting Uncooperative Ethernet Elements using Accurate Round-trip Time Measurements. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 153-156.
Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2005. Incorporating Prejudice into Trust Models to Reduce Network Overload. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 195-200.
Bihina Bella MA, Olivier MS, Eloff JHP: 2005. A fraud detection model for Next-Generation Networks. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 321-326.
Neumann T, Olivier MS: 2005. Enhancements to SIP to prevent abuse of Voice-over-IP services. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 359-363.
Rossudowski AM, Venter HS: 2005. The use of smart cards to perform ATM transactions in an off-line environment. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 427-432.
Tshivhase FE, Venter HS, Eloff JHP: 2005. Implementing Application and Network Security using Aspect-oriented Programming. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 471-475.
Oyomno W, Venter HS: 2005. Link Layer Type-Tagging in Fixed-Phrase Speaker Verification Systems. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 493-499.
|