Proceedings - sorted according to programme

To view the articles you must have Adobe Acrobat installed.  If you do not yet have Adobe Acrobat, you can install it by clicking here. Note that, should you be prompted by the 'Download File' box, choose 'Open'.

Note: Click on the paper number to access a paper

1. Corporate Governance: Information security the weakest link?, Kerry-Lynn Thomson, PE Technikon

2. Towards a pattern-based approach for achieving semantic integrity in object-relational databases, Lance A.K. Ingram, PE Technikon

3. A cyclic approach to Business Continuity Planning, Jacques Botha, PE Technikon

4. Towards a Content-based Billing Model: The Synergy between Access Control and Billing, Peter Jonathan de Villiers, PE Technikon

5. Access control and separation of duty in agent-based workflow environments, Willem Engelbrecht, PE Technikon

6. Quantum Cryptography - Advances in computer science may radically alter cryptography, Evan James Dembskey, Technikon SA

7. An Analysis of Anonymity on the Internet, Francois Searle, PE Technikon

8. Information Security Policy - What do International Information Security Standards say?, Karin Höne , Gensec Bank

9. Secure Database Connectivity On The WWW, Marijke Coetzee, Technikon Witwatersrand

10. Information Security Health Check, Petrunel Gerber, PE Technikon

11. On the Semantic Web and its Web of Trust, Wesley Brandi, RAU

12. Auditing the Employee in the Work Environment with Regard to Information Security, Cheryl Vroom, PE Technikon

13. Security architecture of the Microsoft .NET framework, Oliver Andre Hoppe, Microsoft (UK) & PE Technikon

14. Information Security Awareness: Baseline Education and Certification, Lindie du Plessis, PE Technikon

15. The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System, Karin Venter, RAU

16. A Web-Based Portal For Information Security Education, Johan van Niekerk, PE Technikon

17. Feedback And Task Analysis For E-Commerce Sites, Paula Kotze, UNISA

18. A modified mean value approach to assess security risk, Albin Zuccato, Karlstad University

19. Assessing information security culture, Adéle Martins, RAU & KPMG

20. Information Security Implementation Methodologies, Lizette Robbertze, RAU

21. Steganography - is it becoming a double-edged sword in computer security?, Kim Munro, University of the Witwatersrand

22. Minimizing Security Risk Areas revealed by Data mining, Marianne Loock, UNISA

23. An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection, Ulrich Ultes-Nitsche & InSeon Yoo, University of Southampton

24. Practical Unix Security - Securing IBM's AIX, Simon Taylor, IBM

25. An Efficient Intrusion Detection System Design, Thomas Holz, Brandenburg University of Technology

26. Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations, Simon R. Chudley & Ulrich Ultes-Nitsche, University of Southampton

27. Comparing Intrusion Detection Tools using Generic Vulnerability Categories, Hein Venter, RAU

28. IS Security: User Identification and Authentication - The First Pillar of IS Security, John Rollason, Tom Addison and Kim Munro, University of the Witwatersrand

View the full papers sorted according to the surname of the main author.

KPMG Nanoteq The IQ Business Group