Research Capacity Development

Many of the papers that were not accepted as full papers for the conference proceedings are, however, included here for the purpose of research capacity development. Although such papers did not meet the criteria of a full paper for this conference proceedings, these papers are nevertheless included as "research-in-progress" papers or "poster" papers.

Research-in-progress papers

The research-in-progress papers are, therefore, not considered as full papers. These research-in-progress papers are listed below alphabetically according to the first author:

Title Author Co author  Affiliation Country
Hardware Implementation of AES-CCM for Robust Secure Wireless Network  Aziz, Arshad Habib Rehmatullah  National University of Sciences and Technology
Pakistan Navy Engineering College
Pakistan
Infosec Risk Mitigation Process - Reliance on Demonstrated Diligence Bernstein, Joss   Investec, Group Operational Risk South Africa
Using the IPDR standard for NGN billing and fraud detection Bihina, Madeleine Jan Eloff, Martin Olivier University of Pretoria South Africa
Security of Real-Time Multimedia: A brief survey Clayton, Bradley Barry Irwin & Alfredo Terzoli  Rhodes University South Africa
A Model for Spam Prevention in Voice over IP Networks using Anonymous Verifying Authorities Croft, Neil   University of Pretoria South Africa
Information Security Awarness and Training - The Legal Cost of Untrained Personnel
 
Etsebeth, V   University of Johannesburg South Africa
Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation Fei, BKL J.H.P. Eloff, H.S. Venter and M.S. Olivier University of Pretoria South Africa
New Information security architecture Grobler, T   University of Johannesburg South Africa
A more secure e-commerce environment based on a self-contained biometric USB memory stick Janiszyn, Darek Basie von Solms University of Johannesburg South Africa
Proposing a Secure XACML architecture ensuring privacy and trust Keleta, Yared M. Coetzee , J.H.P Eloff, H.S Venter University of Pretoria South Africa
Computer forensics for a computer-based assessment: the preparation phase Laubscher, R D.J Rabe , M.S Olivier , J.H.P Eloff , H.S Venter Stellenbosch University South Africa
An Investigating into Information Security compliance regulations in the South African financial sector Maphakela, Rabbie D. Pottas & Rossouw von Solms Nelson Mandela Metropolitan University South Africa
Securing IBM mainframe based Web Services using Kerberos Mauer, Gustav   IONA Technologies South Africa
File Integrity Checkers: State of the Art and Best Practices Motara, YM Barry Irwin Rhodes University South Africa
Neural Network Based Camouflaging in still image Selvaraj, J R.Balasubramaniam Manonmaniam Sundaranar University, Tirunelveli India
Educating for Security: An Academic’s Contribution Simeonov, Ludmilla   Massey University @ Wellington New Zealand
Security Scheme for Mobile Agent System in E-Commerce Scenario Singh, Rajwinder A.K.Sarje Indian Institute of Technology Roorkee India
An Investigation of Information Security in Small and Medium Enterprises (SME’s) in the Eastern Cape Upfold, Chris   Rhodes University South Africa
A Framework for evaluating Information Security Risk Management Methodologies for SMMEs Van Niekerk, Liesl L Labuschagne  University of Johannesburg South Africa
Purpose Organisation Van Staden, Wynand Martin Olivier University of Johannesburg South Africa
Windows Server Update Services Review White, Dominic Barry Irwin Rhodes University South Africa

Poster papers

Poster papers refer to those papers that did not fully meet the criteria for both reviewed papers or research-in-progress papers. However, these papers addressed topics of interest to the information security community and are also included as posters for the purpose of research capacity building. These poster papers are listed below alphabetically according to the first author:

Title Author Co author  Affiliation Country
Misuse Intrusion Architecture: Prevent, detect, monitor and recover employee fraud Baloyi, Norman Tinyiko   ISACA South Africa
XML Digital Signature and RDF Cloran, Russell Barry Irwin Rhodes University South Africa
Personal Identification and Authentication by using “The way the heart beats” Du Preez, Johan Basie von Solms University of Johannesburg South Africa
An Investigation into Unintentional Information Leakage through Electronic Publication Forrester, Jock Barry Irwin Rhodes University South Africa
Open source behind legal doors Granova, Anna JHP Eloff University of Pretoria South Africa
Wireless Network Visualization using Radio Propogation Modelling Janse van Rensburg, Johanna Barry Irwin Rhodes University South Africa
Addressing E-crime & Computer Security Issues in Homes and Small organizations in South Africa Kyobe, Michael   University of the Free state Qwaqwa Campus South Africa
Using encryption and trusted third parties to enable data anonymity in the Flocks architecture: a Privacy Enhancing Technology Liu, Yipeng Martin S Olivier University of Pretoria South Africa
Data security implementation for real time internet packet traces Narasimhan, Anantha Sundarram P.V Sri Venkateswara College of engineering, Chennai India
Towards interoperable standardization for end-to-end security in a Grid Services context Seeloa, Gaolathe Maree Pather Nelson Mandela Metropolitan University South Africa