Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Eloff, JHP
BSc (RAU) BSc Hons (RAU) MSc (RAU) PhD (RAU) - Professor and Head
NRF Rating: B2
Contact Details
Research Interests
Research Output
Contact Details:
Telephone number: 012 420 2361
Fax number: 012 362 5188
E-mail address: eloff@cs.up.ac.za
Research Interests:
Computer and Information Security with specific reference to Distributed Systems Security and Privacy
Research Output:
Research articles in refereed specialist journals:
Granova A, Eloff JHP: 2005. A legal overview of phishing. Computer Fraud and Security, / Jul, pp 6-11.
Eloff JHP, Eloff MM: 2005. Information security architecture. Computer Fraud and Security, 11 / Nov, pp 10-16.
Coetzee M, Eloff JHP: 2005. An access control framework for web services. Information Management and Computer Security, 13 (1), Emerald Group Publishing Limited, pp 29-38.
Coetzee M, Eloff JHP: 2005. Autonomous trust for web services. Internet Research-Electronic Networking Applications and Policy, 15 (5), pp 498-507.
Papers in refereed, published conference proceedings:
Fei K, Eloff JHP, Venter HS, Olivier MS: 2005. Exploring Forensic Data with Self-Organizing Maps. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 113-123.
Laubscher R, Rabe D, Olivier MS, Eloff JHP, Venter HS: 2005. Applying Forensic Principles to Computer-Based Assessment. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 105-112.
Morkel T, Olivier MS, Eloff JHP, Venter HS: 2005. One-Time Passwords in a Mobile Environment using Steganography. In Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Diavlos Publications, pp 13-19.
Smith E, Eloff JHP: 2005. A new perspective on Risk Assessment Techniques. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 227-234.
Tillwick H, Neumann T, Olivier MS, Venter HS, Eloff JHP: 2005. Polar: Proxies collaborating to achieve anonymous web browsing. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 317-324.
Venter HS, Olivier MS, Eloff JHP, Botes ME: 2005. Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 377-384.
Coetzee M, Eloff JHP: 2005. Autonomous Trust for Web Services. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 217-225.
Loock M, Eloff JHP: 2005. Investigating the usage of the Chinese Wall Security Policy model for Data Mining. In Proceedings of the Fourth International Symposium on Information and Communication Technologies, Computer Science Press, pp 243-248.
Coetzee M, Eloff JHP: 2005. Metadata for trust in service-oriented architectures. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-11 (CD).
Izadinia VD, Kourie DG, Eloff JHP: 2005. Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-14 (CD).
Loock M, Eloff JHP: 2005. A new Access Control model based on the Chinese Wall Security Policy Model. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-10 (CD).
Morkel T, Eloff JHP, Olivier MS: 2005. An overview of image steganography. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-11 (CD).
Laubscher R, Olivier MS, Venter HS, Eloff JHP, Rabe DJ: 2005. The Role of Key Loggers in Computer-based Assessment Forensics. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 123-130.
Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2005. Incorporating Prejudice into Trust Models to Reduce Network Overload. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 195-200.
Bihina Bella MA, Olivier MS, Eloff JHP: 2005. A fraud detection model for Next-Generation Networks. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 321-326.
Tshivhase FE, Venter HS, Eloff JHP: 2005. Implementing Application and Network Security using Aspect-oriented Programming. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 471-475.
|