Title |
Author |
Co author |
Affiliation |
Country |
A Framework for Evaluation of
Information Systems Security |
Chaula, Job Asheri |
Louise Yngström & Stewart Kowalski |
Stockholm University/KTH |
Sweden
 |
A Framework for Information
Security Risk Management Communication |
Bornman, Werner |
L Labuschagne |
University of Johannesburg |
South Africa
 |
A holistic framework for the
fostering of an information security sub-culture in organizations. |
Van Niekerk, Johan |
Rossouw von Solms |
Nelson Mandela Metropolitan University |
South Africa
 |
A new Access Control model
based on the Chinese Wall Security Policy Model |
Loock, M |
Jan Eloff |
University of Pretoria |
South Africa
 |
A new framework for bridging the
gap between IT Service Management and IT Governance from a security
perspective |
Da Cruz, Eduardo |
L. Labuschagne |
University of Johannesburg |
South Africa
 |
A security framework for an ERP
system |
Marnewick, Carl |
L Labuschagne |
University of Johannesburg |
South Africa
 |
Access to copyrighted work: right
or privelege? |
Jansen, M |
|
University of South Africa |
South Africa
 |
Analysis of the financial
institutions' strategic e-business security solutions: Technical and
non-Technical |
Baloyi, Norman Tinyiko |
|
ISACA |
South Africa
 |
An approach to enhance the
security of ICT infrastructure through legal, regulatory influences |
Tarimo, Charles N |
Louise Yngström & Stewart Kowalski |
Royal Institute of Technology / Stockholm University |
Sweden
 |
An assessment of Information
Security Policies within the Polokwane area: A case study |
Mlangeni, SA |
E. Biermann |
Tshwane University of Technology |
South Africa
 |
An overview of image
steganography |
Morkel, T |
Jan Eloff, Martin Olivier |
University of Pretoria |
South Africa
 |
Attacking Signed Binaries |
Slaviero, Marco |
Jaco Kroon, Martin Olivier |
University of Pretoria |
South Africa
 |
Coin-based Anonymous
Fingerprinting Scheme with Automatic Identification of Redistributors |
Okamura, Shingo |
Maki Yoshida & Toru Fujiwara |
Graduate School of Information Science and Technology, Osaka University |
Japan
 |
Cryptographic Key Management
principles applied in South African Internet Banking |
Parkin, Emile |
|
NamITech |
South Africa
 |
Developing Threat Networks for
Risk Analysis of Information Systems |
Longley, Dennis |
Mark Allan Branagan |
Queensland University of Technology |
Australia
 |
Fighting spam in a corporate
environment using open-source solutions - a case study |
Blaauw, Pieter |
|
Pick 'n Pay Info Systems |
South Africa
 |
Foiling an Attack -- Defeating
IPSec Tunnel Fingerprinting |
Izadinia, Vafa D |
Jan Eloff and Derrick Kourie |
University of Pretoria |
South Africa
 |
Information Security Culture –
Status Quo in Switzerland |
Schlienger, Thomas |
Stephanie Teufel & Raphael Rues |
University of Fribourg |
Switzerland
 |
Information Security Management
and Regulatory Compliance in the South African Health Sector |
Tuyikeze, T |
D. Pottas |
Nelson Mandela Metropolitan University |
South Africa
 |
Introduction to Assessing and
Securing Web Services |
Breytenbach, Christoff |
|
SensePost Information Security |
South Africa
 |
Invasion of the RFIDs: are we
heading towards “Modern Times”? |
Ghioni, Fabio |
|
Telecom Italia |
Italy
 |
IT Forensics: the collection of
and presentation of digital evidence |
Hershensohn, Johann |
|
Computer Security and Forensic Solutions |
South Africa
 |
Measuring Information Security
Awareness - A West Africa Gold Mining Environment Case |
Kruger, HA |
WD Kearney |
North-West University (Potchefstroom Campus) + AngloGold Ashanti |
South Africa & Australia
 |
Measuring the effectivness of an
internal control system |
List, William |
Dr David Brewer |
Gamma Secure Systems Limited |
United Kingdom
 |
Metadata for trust in
service-oriented architectures |
Coetzee, M |
J. H. P. Eloff |
University of Pretoria |
South Africa |
Requirement Analysis of
Enterprise DRM Systems |
Arnab, Alapan |
Andrew Hutchison |
University of Cape Town |
South Africa
 |
Revisiting Reachability
Management as a Multilateral Security Mechanism |
Ophoff, Jacques |
Reinhardt Botha |
Nelson Mandela Metropolitan University |
South Africa
 |
Secure Authentication combined
with Anonymity: The end of an oxymoron? |
Frangopoulos, Evangelos D |
Lucas M. Venter & Mariki M. Eloff |
University of South Africa |
South Africa
 |
Securing SOAP Messages with a
Global Message Handler and a Standardized Envelope |
Pather, Maree |
L M Venter |
Nelson Mandela Metropolitan University |
South Africa
 |
Security for Distributed
Web-Services via Aspect-Oriented Programming |
Schmidt, Adreas U |
Nicolai Kuntze & Thomas Rauch |
Fraunhofer-Institute for Secure Information Technology |
Germany
 |
Sketch of a generic security
framework based on the paradigms of systemic-holistic approach and the
immune system. |
Mwakalinga, Jeffy |
Louise Yngström |
Royal Institute of Technology / Stockholm University |
Sweden
 |
The building blocks of
Information Security Culture |
Da Veiga, Adele |
|
University of Pretoria |
South Africa
 |
The Proliferation of Wireless
Devices and its Role in Corporate Governance |
Mulder, R |
Rossouw von Solms |
Nelson Mandela Metropolitan University |
South Africa
 |
Trust on the Web |
Cloran, Russell |
Barry Irwin |
Rhodes University |
South Africa
 |
Unlocking the armour : enabling
intrusion detection and analysis of encrypted traffic streams |
Irwin, Barry |
|
Rhodes University |
South Africa
 |