Proceedings - sorted according to
programme To view the articles you must have Adobe Acrobat
installed. If you do not yet have Adobe Acrobat, you can install it
by clicking here. Note that, should
you be prompted by the 'Download File' box, choose 'Open'.
Note: Click on
the paper number to access a paper
1. Corporate Governance: Information security the weakest link?,
Kerry-Lynn Thomson, PE Technikon
2. Towards a pattern-based approach for achieving semantic
integrity in object-relational databases, Lance A.K. Ingram, PE Technikon
3. A cyclic approach to Business Continuity Planning, Jacques
Botha, PE Technikon
4. Towards a Content-based Billing Model: The Synergy between
Access Control and Billing, Peter Jonathan de Villiers, PE Technikon
5. Access control and separation of duty in agent-based workflow
environments, Willem Engelbrecht, PE Technikon
6. Quantum Cryptography - Advances in computer science may
radically alter cryptography, Evan James Dembskey, Technikon SA
7. An Analysis of Anonymity on the Internet, Francois Searle, PE
Technikon
8. Information Security Policy - What do International
Information Security Standards say?, Karin Höne , Gensec Bank
9. Secure Database Connectivity On The WWW, Marijke Coetzee,
Technikon Witwatersrand
10. Information Security Health Check, Petrunel Gerber, PE
Technikon
11. On the Semantic Web and its Web of Trust, Wesley Brandi, RAU
12. Auditing the Employee in the Work Environment with Regard to
Information Security, Cheryl Vroom, PE Technikon
13. Security architecture of the Microsoft .NET framework, Oliver
Andre Hoppe, Microsoft (UK) & PE Technikon
14. Information Security Awareness: Baseline Education and
Certification, Lindie du Plessis, PE Technikon
15. The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In
A Secure Workflow Management System, Karin Venter, RAU
16. A Web-Based Portal For Information Security Education, Johan
van Niekerk, PE Technikon
17. Feedback And Task Analysis For E-Commerce Sites, Paula Kotze,
UNISA
18. A modified mean value approach to assess security risk, Albin
Zuccato, Karlstad University
19. Assessing information security culture, Adéle Martins, RAU & KPMG
20. Information Security Implementation Methodologies, Lizette
Robbertze, RAU
21. Steganography - is it becoming a double-edged sword in
computer security?, Kim Munro, University of the Witwatersrand
22. Minimizing Security Risk Areas revealed by Data mining, Marianne Loock,
UNISA
23. An Integrated Network Security Approach - Pairing Detecting
Malicious Patterns with Anomaly Detection, Ulrich Ultes-Nitsche & InSeon Yoo,
University of Southampton
24. Practical Unix Security - Securing IBM's AIX, Simon Taylor,
IBM
25. An Efficient Intrusion Detection System Design, Thomas Holz,
Brandenburg University of Technology
26. Configuring Firewalls - An XML-based Approach to Modelling
and Implementing Firewall Configurations, Simon R. Chudley & Ulrich
Ultes-Nitsche, University of Southampton
27. Comparing Intrusion Detection Tools using Generic Vulnerability Categories, Hein Venter, RAU
28. IS Security: User Identification and Authentication - The First Pillar of
IS Security, John Rollason, Tom Addison and Kim Munro, University of the
Witwatersrand
View the full papers sorted according to the surname of the
main author.
|