Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output
Research articles in refereed specialist journals:
Da Veiga A, Eloff JHP: 2007. An Information Security Governance Framework. Information Systems Management, 24, pp 361-372.
Olinger HN, Britz JJ, Olivier MS: 2007. Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa. International Information and Library Review, 39, pp 31-43, Full Text
Coetzee M, Eloff JHP: 2007. Web services access control architecture incorporating trust. Internet Research-Electronic Networking Applications and Policy, 17 (3), pp 291-305, Full Text
Gruner S: 2007. How big is your IT department?. South African Computer Journal, 38 / Jun, pp 62-63, Full Text
Da Veiga A, Martins N, Eloff JHP: 2007. Information security culture - validation of an assessment instrument. Southern African Business Review, 11 (1) / Apr, pp 147-166, Full Text
Papers in refereed, published conference proceedings:
Arthur KK, Olivier MS, Venter HS: 2007. Applying the Biba Integrity Model to Evidence Management. In Advances in Digital Forensics III: IFIP International Conference on Digital Forensics, Springer Verlag, pp 317-327.
Grant TJ, Venter HS, Eloff JHP: 2007. Simulating Adversarial Interactions between Intruders and System Administrators using OODA-RR. In Proceedings of SAICSIT 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, Association for Computing Machinery (ACM), pp 46-55.
Van Staden W, Olivier MS: 2007. SQL's Revoke with a view on Privacy. In Proceedings of SAICSIT 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, Association for Computing Machinery (ACM), pp 181-188.
Kotze DJJ, Olivier MS: 2007. Patlet for Digital Forensics First Responders. In Proceedings of the 18th International Conference on Database and Expert Systems Applications, IEEE, pp 770-774.
Adigun EA, Eloff JHP: 2007. Defining a Trusted Service-Oriented Network Environment. In Second International Conference on Availability, Reliability and Security, IEEE, pp 1245-1250.
Koen R, Olivier MS: 2007. An Open-Source Forensics Platform. In Southern African Telecommunication Networks and Applications Conference (SATNAC), Telkom, pp 1-6.
Rossudowski AM, Venter HS: 2007. Secure Remote User Authentication over an Unsecure Telecommunications Network. In Southern African Telecommunication Networks and Applications Conference (SATNAC), Telkom, pp 1-6.
Reddy K, Venter HS: 2007. Privacy Capability Maturity Models within Telecommunications Organisations. In Southern African Telecommunication Networks and Applications Conference (SATNAC), Telkom, pp 1-6.
Croft NJ, Olivier MS: 2007. A Silent SMS Denial of Service (DoS) Attack. In Southern African Telecommunication Networks and Applications Conference (SATNAC), Telkom, pp 1-6.
Veerasamy N, Eloff JHP: 2007. Framework for the Establishment of a Honeynet. In Southern African Telecommunication Networks and Applications Conference (SATNAC), Telkom, pp 1-6.
Padayachee K, Eloff JHP: 2007. Enhancing Optimistic Access Controls with Usage Control. In Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007 Proceedings, Springer Verlag, pp 75-82.
Coetzee M, Eloff JHP: 2007. A Trust and Context Aware Access Control Model for Web Services Conversations. In Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007 Proceedings, Springer Verlag, pp 115-124.
Van Staden W, Olivier MS: 2007. Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. In Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007 Proceedings, Springer Verlag, pp 201-209.
|