Research 2011

Research Interest Home

Researchers Involved

Research Output

Postgraduate Student Projects

Back To

Department Research Interests

 

Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science

Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output

Research articles in refereed specialist journals:

Reddy K, Venter HS, Olivier MS: 2011. Using time-driven activity-based costing to manage digital forensic readiness in large organisations. Information Systems Frontiers, / Oct, p. Online.

Van Staden W, Olivier MS: 2011. On Compound Purposes and Compound Reasons for Enabling Privacy. Journal of Universal Computer Science (JUCS), 17 (3) / Feb, pp 426-450, Full Text

Olivier MS, Eloff JHP, Venter HS, Botes ME: 2011. Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities. South African Computer Journal, 47, pp 47-57, Full Text

Croft NJ, Olivier MS: 2011. Location Privacy: Privacy, Efficiency and Resource through a Prohibitive Contract. Transactions on Data Privacy, 4, pp 19-30.

Papers in refereed, published conference proceedings:

Beyers HQ, Olivier MS, Hancke GP: 2011. Assembling Metadata for Database Forensics. In Advances in Digital Forensics VII, (1), Springer, pp 89-99.

Fouche MA, Olivier MS: 2011. Steganographic Techniques for Hiding Data in SWF Files. In Advances in Digital Forensics VII, (3), Springer, pp 245-255.

Vural I, Venter HS: 2011. Detecting Mobile Spam Botnets using Artificial Immune Systems. In Advances in Digital Forensics VII, (2), Springer, pp 183-192.

Adam R, Herselman M, Chuang CH, Smit D, Eloff JHP, Zielinski MP: 2011. Challenges of Evaluating a Living Lab in South Africa. In CIRN Prato Community Informatics Conference 2011, (1), pp 1-10.

Mouton F, Venter HS: 2011. A prototype for achieving digital forensic readiness on wireless sensor networks. In IEEE Africon 2011, (d), IEEE, pp 1-6 CD.

Dlamini MT, Eloff JHP, Zielinski MP, Chuang CH, Smit D: 2011. User-centric Information Security Systems - A Living Lab Approach. In Proceedings of the 10th European Conference on Information Warefare and Security, (1), Academic Publishers, UK, pp 73-80.

Burke I, Van Heerden R, Olivier MS: 2011. Analysing the fairness of trust-based Mobile Ad Hoc Network protocols. In Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference, (5), IEEE, pp 103-110.

Serra SM, Venter HS: 2011. Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness. In Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference, (2), IEEE, pp 204-209.

Van Staden FR, Venter HS: 2011. Adding digital forensic readiness to electronic communication using a security monitoring tool. In Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference, (3), IEEE, pp 170-174.

Valjarevic A, Venter HS: 2011. Towards a Digital Forensic Readiness Framework for Public Key Infrastructure Systems. In Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference, (4), IEEE, pp 160-169.

Bihina Bella MA, Olivier MS, Eloff JHP: 2011. Proposing a Digital Operational Forensic Investigation Process. In Proceedings of the 6th International Workshop on Digital Forensics & Incident Analysis WDFIA 2011, (1), University of Plymouth, pp 17-32.

Mouton F, Venter HS: 2011. Requirements for Wireless Sensor Networks in order to Achieve Digital Forensic Readiness. In Proceedings of the 6th International Workshop on Digital Forensics & Incident Analysis WDFIA 2011, (2), University of Plymouth, pp 108-121.

Dlamini MT, Eloff MM, Eloff JHP, Venter HS: 2011. A Budget Model for Information Security. In Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance HAISA 2011, (1), University of Plymouth, pp 47-57.

Grobler M, Flowerday S, Von Solms R, Venter HS: 2011. Cyber Awareness Initiatives in South Africa: A National Perspective. In Proceedings of the First IFIP TC9/TC11 Southern African Cyber Security Awareness Workshopp 2011, (1), Defence, Peace, Safety and Security, pp 32-41.

Dlamini MT, Venter HS, Eloff JHP, Eloff MM: 2011. Security of Cloud Computing: Seeing through the Fog. In Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2011, (h), Telkom, pp 1-6 CD.

 

Related Links

Department of Computer Science Home Page