Research 2008

Research Interest Home

Researchers Involved

Research Output

Postgraduate Student Projects

Back To

Department Research Interests

 

Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science

Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output

Research articles in refereed specialist journals:

Venter HS, Eloff JHP, Li Y: 2008. Standardising vulnerability categories. Computers & Security, 27 / Apr, pp 71-83.

Tillwick H, Olivier MS: 2008. Bridging the gap between anonymous e-mail and anonymous web browsing. Online Information Review, 32 (1), pp 22-34.

Papers in refereed, published conference proceedings:

Koen R, Olivier MS: 2008. An evidence acquisition tool for live systems. In Advances in Digital Forensics IV, (25), IFIP, a Springer Series in Computer Science, pp 325-334.

Olivier MS: 2008. Using sensor dirt for toolmark analysis of digital photographs. In Advances in Digital Forensics IV, (16), IFIP, a Springer Series in Computer Science, pp 193-206.

Brandi W, Olivier MS, Zugenmaier A: 2008. Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. In Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), Springer, pp 195-204.

Mokhonoana PM, Olivier MS: 2008. Application of Message Digests for the Verification of Logical Forensic Data. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-10.

Koen R, Olivier MS: 2008. The use of File Timestamps in Digital Forensics. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-15.

Kohn MD, Eloff JHP, Olivier MS: 2008. UML Modelling of Digital Forensic Process Models (DFPMs). In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-12.

Veerasamy N, Eloff JHP: 2008. Towards a Framework for a Network Warfare Capability. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-18.

Reddy K, Venter HS, Olivier MS, Currie I: 2008. Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. In Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, IEEE, pp 56-64.

Veerasamy N, Eloff JHP: 2008. The application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment. In Proceedings of World Academy of Science, Engineering and Technology, WASET, pp 567-573.

Adigun EA, Eloff JHP: 2008. Implementing a Trusted Service-Oriented Network Environment. In Southern Africa Telecommunication Networks and Applications Conference (SATNAC), Telkom SA, pp 1-6.

 

Related Links

Department of Computer Science Home Page