Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output
Research articles in refereed specialist journals:
Padayachee K, Eloff JHP: 2009. Adapting usage control as a deterrent to address the inadequacies of access controls. Computers & Security, 28 (7) / Oct, pp 536-544, Full Text
Dlamini MT, Eloff JHP, Eloff MM: 2009. Information security: The moving target. Computers & Security, (28) / Nov, pp 189-198, Full Text
Obiedkov S, Kourie DG, Eloff JHP: 2009. Building access control models with attribute exploration. Computers & Security, (28) / Jul, pp 2-7.
Bihina Bella MA, Eloff JHP, Olivier MS: 2009. A fraud management system architecture for next-generation networks. Forensic Science International, 185 (1-3) / Mar, pp 51-58, Full Text
Papers in refereed, published conference proceedings:
Ngobeni SJ, Venter HS: 2009. The Design of a Wireless Forensic Readiness Model (WFRM). In Proceedings of the ISSA 2009 Conference, ISSA, pp 35-51.
Dlamini MT, Eloff MM, Eloff JHP, Hone K: 2009. BC3I - Towards Requirements Specification for preparing an Information Security Budget. In Proceedings of the ISSA 2009 Conference, ISSA, pp 53-67.
Vural I, Venter HS: 2009. Investigating Identity Concealing and Email Tracing Techniques. In Proceedings of the ISSA 2009 Conference, ISSA, pp 293-308.
Reddy K, Venter HS: 2009. Using Object-Oriented Concepts to develop a High-Level Information Privacy Risk Management Model. In The Proceedings of the International Conference: Information and Communication Technologies in Tourism 2009, IEEE Computer Society, pp 23-30.
|