Proceedings - sorted according to author

To view the articles you must have Adobe Acrobat installed.  If you do not yet have Adobe Acrobat, you can install it by clicking here. Note that, should you be prompted by the 'Download File' box, choose 'Open'.

Note: Click on the sorted paper number to access a paper

1. A cyclic approach to Business Continuity Planning, Jacques Botha, PE Technikon

2. On the Semantic Web and its Web of Trust, Wesley Brandi, RAU

3. Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations, Simon R. Chudley & Ulrich Ultes-Nitsche, University of Southampton

4. Secure Database Connectivity On The WWW, Marijke Coetzee, Technikon Witwatersrand

5. Towards a Content-based Billing Model: The Synergy between Access Control and Billing, Peter Jonathan de Villiers, PE Technikon

6. Quantum Cryptography - Advances in computer science may radically alter cryptography, Evan James Dembskey, Technikon SA

7. Information Security Awareness: Baseline Education and Certification, Lindie du Plessis, PE Technikon

8. Access control and separation of duty in agent-based workflow environments, Willem Engelbrecht, PE Technikon

9. Information Security Health Check, Petrunel Gerber, PE Technikon

10. An Efficient Intrusion Detection System Design, Thomas Holz, Brandenburg University of Technology

11. Information Security Policy - What do International Information Security Standards say?, Karin Höne , Gensec Bank

12. Security architecture of the Microsoft .NET framework, Oliver Andre Hoppe, Microsoft (UK) & PE Technikon

13. Towards a pattern-based approach for achieving semantic integrity in object-relational databases, Lance A.K. Ingram, PE Technikon

14. Feedback And Task Analysis For E-Commerce Sites, Paula Kotze, UNISA

15. Minimizing Security Risk Areas revealed by Data mining, Marianne Loock, UNISA

16. Assessing Information Security Culture, Adéle Martins, RAU & KPMG

17. Steganography - is it becoming a double-edged sword in computer security?, Kim Munro, University of the Witwatersrand

18. Information Security Implementation Methodologies, Lizette Robbertze, RAU

19. IS Security: User Identification and Authentication - The First Pillar of IS Security, John Rollason, Tom Addison and Kim Munro, University of the Witwatersrand

20. An Analysis of Anonymity on the Internet, Francois Searle, PE Technikon

21. Practical Unix Security - Securing IBM's AIX, Simon Taylor, IBM

22. Corporate Governance: Information security the weakest link?, Kerry-Lynn Thomson, PE Technikon

23. An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection, Ulrich Ultes-Nitsche & InSeon Yoo, University of Southampton

24. A Web-Based Portal For Information Security Education, Johan van Niekerk, PE Technikon

25. Comparing Intrusion Detection Tools using Generic Vulnerability Categories, Hein Venter, RAU

26. The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System, Karin Venter, RAU

27. Auditing the Employee in the Work Environment with Regard to Information Security, Cheryl Vroom, PE Technikon

28. A modified mean value approach to assess security risk, Albin Zuccato, Karlstad University

View the full papers sorted according to the programme.

KPMG Nanoteq The IQ Business Group