Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output
Research articles in refereed specialist journals:
Izadinia VD, Kourie DG, Eloff JHP: 2006. Uncovering identities: A study into VPN tunnel fingerprinting. Computers & Security, 25 (1) / Mar, pp 97-105.
Oberholzer HJG, Olivier MS: 2006. Privacy contracts incorporated in a privacy protection framework. Computer Systems Science and Engineering, 21 (1) / Jan, pp 5-16.
Fei BKL, Eloff JHP, Olivier MS, Venter HS: 2006. The use of self-organising maps for anomalous behaviour detection in a digital investigation. Forensic Science International, 162 / Jul, pp 33-37.
Van Staden W, Olivier MS: 2006. Extending SQL to allow the active usage of purposes. Lecture Notes in Computer Science, 4083 / Sep, pp 123-131.
Neumann T, Tillwick H, Olivier MS: 2006. Information leakage in ubiquitous voice-over-IP communications. Lecture Notes in Computer Science, In Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), 4083 / Sep, Springer, pp 233-242.
Brandi W, Olivier MS: 2006. Extending P3P to facilitate proxies which pose as a potential threat to privacy. Lecture Notes in Computer Science, 4083 / Sep, pp 81-90.
Wojcik M, Eloff JHP, Venter HS: 2006. Trust model architecture: Defining prejudice by learning. Lecture Notes in Computer Science, 4083 / Sep, pp 182-191.
Morkel T, Eloff JHP, Olivier MS: 2006. Using image steganography for decryptor distribution. Lecture Notes in Computer Science, 4277 / Nov, pp 322-330.
Papers in refereed, published conference proceedings:
Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2006. Applying Machine Trust Models to Forensic Investigations. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 55-65.
Fei BKL, Eloff JHP, Olivier MS, Venter HS: 2006. Analysis of Web Proxy Logs. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 247-258.
Slaviero ML, Granova A, Olivier MS: 2006. Active Traffic Capture for Network Forensics. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 215-228.
Strauss MD, Olivier MS, Kourie DG: 2006. Logical Traffic Isolation using Differentiated Services. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 229-237.
Padayachee K, Eloff JHP: 2006. An Aspect-Oriented Implementation of e-Consent to Foster Trust. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 164-169.
Coetzee M, Eloff JHP: 2006. A Framework for Web Services Trust. In Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), International Federation for Information Processing, pp 75-86.
Croft NJ, Olivier MS: 2006. Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-14.
Kohn MD, Eloff JHP, Olivier MS: 2006. Framework for a Digital Forensic Investigation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-7.
MacManus L, Eloff JHP: 2006. Using IT Benchmarking Principles to design an Information Security Benchmark Model. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-10.
Wojcik M, Venter HS, Eloff JHP: 2006. Trust Model Evaluation Criteria: A Detailed Analysis of Trust Evaluation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-9.
Brandi W, Olivier MS: 2006. On bidder zones, cell phones and ballot stuffing. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-11.
Padayachee K, Eloff JHP: 2006. The Next Challenge: Aspect-Oriented Programming. In Proceedings of the Sixth IASTED International Conference on Modelling, Simulation and Optimization, ACTA Press, pp 304-307.
Wojcik M, Venter HS, Eloff JHP: 2006. A Detailed Analysis of Trust Representation as a Trust Model Evaluation Criterion. In Southern African Telecommunication Networks Applications Conference (SATNAC) 2006 Proceedings, Telkom, pp 1-6.
Croft NJ, Olivier MS: 2006. Anonymous Mobile Conference Calls. In Southern African Telecommunication Networks Applications Conference (SATNAC) 2006 Proceedings, Telkom, pp 1-6.
|