Research 2005

Department Home

Researchers

Guest Researchers

Research Interests

Research Output

Postgraduate Student Projects 2005

Research Findings

Funded Projects

Back To

Researchers

 

Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science

Eloff, JHP

BSc (RAU) BSc Hons (RAU) MSc (RAU) PhD (RAU) - Professor and Head

NRF Rating: B2

Contact Details

Research Interests

Research Output

Contact Details:

Telephone number: 012 420 2361
Fax number: 012 362 5188
E-mail address: eloff@cs.up.ac.za

Research Interests:

Computer and Information Security with specific reference to Distributed Systems Security and Privacy

Research Output:

Research articles in refereed specialist journals:

Granova A, Eloff JHP: 2005. A legal overview of phishing. Computer Fraud and Security, / Jul, pp 6-11.

Eloff JHP, Eloff MM: 2005. Information security architecture. Computer Fraud and Security, 11 / Nov, pp 10-16.

Coetzee M, Eloff JHP: 2005. An access control framework for web services. Information Management and Computer Security, 13 (1), Emerald Group Publishing Limited, pp 29-38.

Coetzee M, Eloff JHP: 2005. Autonomous trust for web services. Internet Research-Electronic Networking Applications and Policy, 15 (5), pp 498-507.

Papers in refereed, published conference proceedings:

Fei K, Eloff JHP, Venter HS, Olivier MS: 2005. Exploring Forensic Data with Self-Organizing Maps. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 113-123.

Laubscher R, Rabe D, Olivier MS, Eloff JHP, Venter HS: 2005. Applying Forensic Principles to Computer-Based Assessment. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 105-112.

Morkel T, Olivier MS, Eloff JHP, Venter HS: 2005. One-Time Passwords in a Mobile Environment using Steganography. In Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Diavlos Publications, pp 13-19.

Smith E, Eloff JHP: 2005. A new perspective on Risk Assessment Techniques. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 227-234.

Tillwick H, Neumann T, Olivier MS, Venter HS, Eloff JHP: 2005. Polar: Proxies collaborating to achieve anonymous web browsing. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 317-324.

Venter HS, Olivier MS, Eloff JHP, Botes ME: 2005. Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 377-384.

Coetzee M, Eloff JHP: 2005. Autonomous Trust for Web Services. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 217-225.

Loock M, Eloff JHP: 2005. Investigating the usage of the Chinese Wall Security Policy model for Data Mining. In Proceedings of the Fourth International Symposium on Information and Communication Technologies, Computer Science Press, pp 243-248.

Coetzee M, Eloff JHP: 2005. Metadata for trust in service-oriented architectures. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-11 (CD).

Izadinia VD, Kourie DG, Eloff JHP: 2005. Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-14 (CD).

Loock M, Eloff JHP: 2005. A new Access Control model based on the Chinese Wall Security Policy Model. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-10 (CD).

Morkel T, Eloff JHP, Olivier MS: 2005. An overview of image steganography. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-11 (CD).

Laubscher R, Olivier MS, Venter HS, Eloff JHP, Rabe DJ: 2005. The Role of Key Loggers in Computer-based Assessment Forensics. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 123-130.

Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2005. Incorporating Prejudice into Trust Models to Reduce Network Overload. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 195-200.

Bihina Bella MA, Olivier MS, Eloff JHP: 2005. A fraud detection model for Next-Generation Networks. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 321-326.

Tshivhase FE, Venter HS, Eloff JHP: 2005. Implementing Application and Network Security using Aspect-oriented Programming. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 471-475.

 

Related Links

Department of Computer Science Home Page

NRF Rating Information