Research 2006

Research Interest Home

Researchers Involved

Research Output

Postgraduate Student Projects

Back To

Department Research Interests

 

Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science

Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output

Research articles in refereed specialist journals:

Izadinia VD, Kourie DG, Eloff JHP: 2006. Uncovering identities: A study into VPN tunnel fingerprinting. Computers & Security, 25 (1) / Mar, pp 97-105.

Oberholzer HJG, Olivier MS: 2006. Privacy contracts incorporated in a privacy protection framework. Computer Systems Science and Engineering, 21 (1) / Jan, pp 5-16.

Fei BKL, Eloff JHP, Olivier MS, Venter HS: 2006. The use of self-organising maps for anomalous behaviour detection in a digital investigation. Forensic Science International, 162 / Jul, pp 33-37.

Van Staden W, Olivier MS: 2006. Extending SQL to allow the active usage of purposes. Lecture Notes in Computer Science, 4083 / Sep, pp 123-131.

Neumann T, Tillwick H, Olivier MS: 2006. Information leakage in ubiquitous voice-over-IP communications. Lecture Notes in Computer Science, In Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), 4083 / Sep, Springer, pp 233-242.

Brandi W, Olivier MS: 2006. Extending P3P to facilitate proxies which pose as a potential threat to privacy. Lecture Notes in Computer Science, 4083 / Sep, pp 81-90.

Wojcik M, Eloff JHP, Venter HS: 2006. Trust model architecture: Defining prejudice by learning. Lecture Notes in Computer Science, 4083 / Sep, pp 182-191.

Morkel T, Eloff JHP, Olivier MS: 2006. Using image steganography for decryptor distribution. Lecture Notes in Computer Science, 4277 / Nov, pp 322-330.

Papers in refereed, published conference proceedings:

Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2006. Applying Machine Trust Models to Forensic Investigations. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 55-65.

Fei BKL, Eloff JHP, Olivier MS, Venter HS: 2006. Analysis of Web Proxy Logs. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 247-258.

Slaviero ML, Granova A, Olivier MS: 2006. Active Traffic Capture for Network Forensics. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 215-228.

Strauss MD, Olivier MS, Kourie DG: 2006. Logical Traffic Isolation using Differentiated Services. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 229-237.

Padayachee K, Eloff JHP: 2006. An Aspect-Oriented Implementation of e-Consent to Foster Trust. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 164-169.

Coetzee M, Eloff JHP: 2006. A Framework for Web Services Trust. In Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), International Federation for Information Processing, pp 75-86.

Croft NJ, Olivier MS: 2006. Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-14.

Kohn MD, Eloff JHP, Olivier MS: 2006. Framework for a Digital Forensic Investigation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-7.

MacManus L, Eloff JHP: 2006. Using IT Benchmarking Principles to design an Information Security Benchmark Model. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-10.

Wojcik M, Venter HS, Eloff JHP: 2006. Trust Model Evaluation Criteria: A Detailed Analysis of Trust Evaluation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-9.

Brandi W, Olivier MS: 2006. On bidder zones, cell phones and ballot stuffing. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-11.

Padayachee K, Eloff JHP: 2006. The Next Challenge: Aspect-Oriented Programming. In Proceedings of the Sixth IASTED International Conference on Modelling, Simulation and Optimization, ACTA Press, pp 304-307.

Wojcik M, Venter HS, Eloff JHP: 2006. A Detailed Analysis of Trust Representation as a Trust Model Evaluation Criterion. In Southern African Telecommunication Networks Applications Conference (SATNAC) 2006 Proceedings, Telkom, pp 1-6.

Croft NJ, Olivier MS: 2006. Anonymous Mobile Conference Calls. In Southern African Telecommunication Networks Applications Conference (SATNAC) 2006 Proceedings, Telkom, pp 1-6.

 

Related Links

Department of Computer Science Home Page