Proceedings - sorted according to
author To view the articles you must have Adobe Acrobat
installed. If you do not yet have Adobe Acrobat, you can install it
by clicking here. Note that, should
you be prompted by the 'Download File' box, choose 'Open'.
Note: Click on the
sorted paper number to access a paper
1. A cyclic approach to Business Continuity Planning, Jacques
Botha, PE Technikon
2. On the Semantic Web and its Web of Trust, Wesley Brandi,
RAU
3. Configuring Firewalls - An XML-based Approach to Modelling and
Implementing Firewall Configurations, Simon R. Chudley & Ulrich
Ultes-Nitsche, University of Southampton
4. Secure Database Connectivity On The WWW, Marijke Coetzee,
Technikon Witwatersrand
5. Towards a Content-based Billing Model: The Synergy between
Access Control and Billing, Peter Jonathan de Villiers, PE Technikon
6. Quantum Cryptography - Advances in computer science may
radically alter cryptography, Evan James Dembskey, Technikon SA
7. Information Security Awareness: Baseline Education and
Certification, Lindie du Plessis, PE Technikon
8. Access control and separation of duty in agent-based workflow
environments, Willem Engelbrecht, PE Technikon
9. Information Security Health Check, Petrunel Gerber, PE
Technikon
10. An Efficient Intrusion Detection System Design, Thomas
Holz, Brandenburg University of Technology
11. Information Security Policy - What do International
Information Security Standards say?, Karin Höne , Gensec Bank
12. Security architecture of the Microsoft .NET framework, Oliver
Andre Hoppe, Microsoft (UK) & PE Technikon
13. Towards a pattern-based approach for achieving semantic
integrity in object-relational databases, Lance A.K. Ingram, PE
Technikon
14. Feedback And Task Analysis For E-Commerce Sites, Paula
Kotze, UNISA
15. Minimizing Security Risk Areas revealed by Data mining, Marianne Loock,
UNISA
16. Assessing Information Security Culture, Adéle Martins, RAU & KPMG
17. Steganography - is it becoming a double-edged sword in
computer security?, Kim Munro, University of the Witwatersrand
18. Information Security Implementation Methodologies, Lizette
Robbertze, RAU
19. IS Security: User Identification and Authentication - The First Pillar of
IS Security, John Rollason, Tom Addison and Kim Munro, University of
the Witwatersrand
20. An Analysis of Anonymity on the Internet, Francois Searle,
PE Technikon
21. Practical Unix Security - Securing IBM's AIX, Simon Taylor,
IBM
22. Corporate Governance: Information security the weakest link?,
Kerry-Lynn Thomson, PE Technikon
23. An Integrated Network Security Approach - Pairing Detecting
Malicious Patterns with Anomaly Detection, Ulrich Ultes-Nitsche &
InSeon Yoo, University of Southampton
24. A Web-Based Portal For Information Security Education, Johan
van Niekerk, PE Technikon
25. Comparing Intrusion Detection Tools using Generic Vulnerability Categories, Hein Venter, RAU
26. The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In
A Secure Workflow Management System, Karin Venter, RAU
27. Auditing the Employee in the Work Environment with Regard to
Information Security, Cheryl Vroom, PE Technikon
28. A modified mean value approach to assess security risk, Albin
Zuccato, Karlstad University
View the full papers sorted according to the programme.
|