|
Research Capacity Development
Many of the papers that were not
accepted as full papers for the conference proceedings are, however, included
here for the purpose of research capacity development. Although such papers did
not meet the criteria of a full paper for this conference proceedings, these
papers are nevertheless included as "research-in-progress" papers or "poster"
papers.
Research-in-progress
papers
The research-in-progress papers are,
therefore, not considered as full papers.
These research-in-progress papers are listed below alphabetically according to the
first author:
Title |
Author |
Co author |
Affiliation |
Country |
Hardware Implementation of
AES-CCM for Robust Secure Wireless Network |
Aziz, Arshad |
Habib Rehmatullah |
National University of Sciences and Technology
Pakistan Navy Engineering College |
Pakistan |
Infosec Risk
Mitigation Process - Reliance on Demonstrated Diligence |
Bernstein,
Joss |
|
Investec, Group Operational Risk |
South Africa
 |
Using the IPDR standard for
NGN billing and fraud detection |
Bihina, Madeleine |
Jan Eloff, Martin Olivier |
University of Pretoria |
South Africa
 |
Security of Real-Time
Multimedia: A brief survey |
Clayton, Bradley |
Barry Irwin & Alfredo Terzoli |
Rhodes University |
South Africa
 |
A Model for Spam Prevention
in Voice over IP Networks using Anonymous Verifying Authorities |
Croft, Neil |
|
University of Pretoria |
South Africa
 |
Information Security Awarness
and Training - The Legal Cost of Untrained Personnel
|
Etsebeth, V |
|
University of Johannesburg |
South Africa
 |
Using Self-Organising Maps
for Anomalous Behaviour Detection in a Computer Forensic Investigation |
Fei, BKL |
J.H.P. Eloff, H.S. Venter and M.S. Olivier |
University of Pretoria |
South Africa
 |
New Information security
architecture |
Grobler, T |
|
University of Johannesburg |
South Africa
 |
A more secure e-commerce
environment based on a self-contained biometric USB memory stick |
Janiszyn, Darek |
Basie von Solms |
University of Johannesburg |
South Africa
 |
Proposing a Secure XACML
architecture ensuring privacy and trust |
Keleta, Yared |
M. Coetzee , J.H.P Eloff, H.S Venter |
University of Pretoria |
South Africa
 |
Computer forensics for a
computer-based assessment: the preparation phase |
Laubscher, R |
D.J Rabe , M.S Olivier , J.H.P Eloff , H.S Venter |
Stellenbosch University |
South Africa
 |
An Investigating into
Information Security compliance regulations in the South African financial
sector |
Maphakela, Rabbie |
D. Pottas & Rossouw von Solms |
Nelson Mandela Metropolitan University |
South Africa
 |
Securing IBM
mainframe based Web Services using Kerberos |
Mauer,
Gustav |
|
IONA Technologies |
South Africa
 |
File Integrity Checkers:
State of the Art and Best Practices |
Motara, YM |
Barry Irwin |
Rhodes University |
South Africa
 |
Neural Network Based
Camouflaging in still image |
Selvaraj, J |
R.Balasubramaniam |
Manonmaniam Sundaranar University, Tirunelveli |
India
 |
Educating for Security: An
Academic’s Contribution |
Simeonov, Ludmilla |
|
Massey University @ Wellington |
New Zealand
 |
Security Scheme for Mobile
Agent System in E-Commerce Scenario |
Singh, Rajwinder |
A.K.Sarje |
Indian Institute of Technology Roorkee |
India
 |
An Investigation of
Information Security in Small and Medium Enterprises (SME’s) in the Eastern
Cape |
Upfold, Chris |
|
Rhodes University |
South Africa
 |
A Framework for evaluating
Information Security Risk Management Methodologies for SMMEs |
Van Niekerk, Liesl |
L Labuschagne |
University of Johannesburg |
South Africa
 |
Purpose Organisation |
Van Staden, Wynand |
Martin Olivier |
University of Johannesburg |
South Africa
 |
Windows Server Update
Services Review |
White, Dominic |
Barry Irwin |
Rhodes University |
South Africa
 |
Poster papers
Poster papers refer to those papers that did not
fully meet the criteria for both reviewed papers or research-in-progress papers.
However, these papers addressed topics of interest to the information security
community and are also included as posters for the purpose of research capacity
building. These poster papers are listed below alphabetically according to the
first author:
Title |
Author |
Co author |
Affiliation |
Country |
Misuse Intrusion
Architecture: Prevent, detect, monitor and recover employee fraud |
Baloyi, Norman Tinyiko |
|
ISACA |
South Africa
 |
XML Digital Signature and
RDF |
Cloran, Russell |
Barry Irwin |
Rhodes University |
South Africa
 |
Personal Identification and
Authentication by using “The way the heart beats” |
Du Preez, Johan |
Basie von Solms |
University of Johannesburg |
South Africa
 |
An Investigation into
Unintentional Information Leakage through Electronic Publication |
Forrester, Jock |
Barry Irwin |
Rhodes University |
South Africa
 |
Open source behind legal
doors |
Granova, Anna |
JHP Eloff |
University of Pretoria |
South Africa
 |
Wireless Network
Visualization using Radio Propogation Modelling |
Janse van Rensburg, Johanna |
Barry Irwin |
Rhodes University |
South Africa
 |
Addressing E-crime &
Computer Security Issues in Homes and Small organizations in South
Africa |
Kyobe, Michael |
|
University of the Free state Qwaqwa Campus |
South Africa
 |
Using encryption and
trusted third parties to enable data anonymity in the Flocks
architecture: a Privacy Enhancing Technology |
Liu, Yipeng |
Martin S Olivier |
University of Pretoria |
South Africa
 |
Data security
implementation for real time internet packet traces |
Narasimhan, Anantha |
Sundarram P.V |
Sri Venkateswara College of engineering, Chennai |
India
 |
Towards interoperable
standardization for end-to-end security in a Grid Services context |
Seeloa, Gaolathe |
Maree Pather |
Nelson Mandela Metropolitan University |
South Africa |

|