DAY 1 - Wednesday, 29
June 2005 |
07:30–09:00 |
Registration |
|
Session Chairperson: |
09:00-09:10 |
Welcome address:
Prof Jan Eloff,
ISSA Conference Co-chair |
09:10-09:50 |
Plenary session: Security and Privacy, DR
Alf Zugenmaier, DoCoMo Communications Laboratories Europe GmbH |
09:50-10:30 |
TBC |
10:30-11:00 |
Tea |
|
Session Chairperson: |
11:00-11:40 |
The Global KPMG IT Governance Survey, Graham Teare, KPMG, South
Africa
 |
11:40-12:20 |
Digital forensics, Dr Buks Lourens, Executive, Group Risk Services,
Nedbank Group Limited
 |
12:20-13:00 |
Outsourcing security, Lynette Flaxman,
 |
13:00-14:00 |
Lunch |
|
Stream 1:
Management (Reviewed Papers)
Session Chairperson: |
Stream 2:
State-of-the-Art (Reviewed Papers)
Session Chairperson: |
Stream 3:
Industry (Reviewed Papers)
Session Chairperson: |
14:00-14:30 |
Measuring Information Security
Awareness - A West Africa Gold Mining Environment Case, HA Kruger, WD
Kearney, North-West University (Potchefstroom Campus) + AngloGold Ashanti,
South Africa
|
Securing SOAP Messages with a
Global Message Handler and a Standardized Envelope, Maree Pather, L M
Venter, Nelson Mandela Metropolitan University, South Africa
 |
Invasion of the RFIDs: are we heading towards “Modern
Times”?, Fabio
Ghioni, Telecom Italia, Italy
 |
14:30-15:00 |
A new framework
for bridging the gap between IT Service Management and IT Governance from a
security perspective, Eduardo Da Cruz, L. Labuschagne, University of
Johannesburg, South Africa
 |
Foiling an
Attack -- Defeating IPSec Tunnel Fingerprinting, Vafa D. Izadinia, Jan Eloff
and Derrick Kourie, University of Pretoria, South Africa
 |
Fighting spam
in a corporate environment using open-source solutions - a case study,
Pieter Blaauw, Pick 'n Pay Info Systems, South Africa
 |
15:00-15:30 |
The
Proliferation of Wireless Devices and its Role in Corporate Governance, R.
Mulder, Rossouw von Solms, Nelson Mandela Metropolitan University, South
Africa
 |
Revisiting
Reachability Management as a Multilateral Security Mechanism, Jacques Ophoff,
Reinhardt Botha, Nelson Mandela Metropolitan University, South Africa
 |
Analysis of the
financial institutions' strategic e-business security solutions: Technical
and non-Technical, Norman Tinyiko Baloyi, ISACA, South Africa
|
15:30–16:00 |
Tea |
|
Stream 4:
Risk (Reviewed Papers)
Session Chairperson: |
Stream 5:
Frameworks (Reviewed Papers)
Session Chairperson: |
Stream 6:
Identification & Authentication (Reviewed Papers)
Session Chairperson: |
16:00-16:30 |
Developing
Threat Networks for Risk Analysis of Information Systems, Dennis Longley ,
Mark Allan Branagan , Queensland University of Technology, Australia
 |
Sketch of a
generic security framework based on the paradigms of systemic-holistic
approach and the immune system, Jeffy Mwakalinga, Louise Yngström , Royal
Institute of Technology / Stockholm University, Sweden
 |
Coin-based
Anonymous Fingerprinting Scheme with Automatic Identification of
Redistributors, Shingo Okamura, Maki Yoshida & Toru Fujiwara, Osaka
University, Japan

|
16:30-17:00 |
A Framework for
Information Security Risk Management Communication, Werner Bornman, L
Labuschagne, University of Johannesburg, South Africa
 |
A Framework for
Evaluation of Information Systems Security, Job Asheri Chaula, Louise
Yngström & Stewart Kowalski, Stockholm University/KTH, Sweden
 |
Secure
Authentication combined with Anonymity: The end of an oxymoron?, Evangelos
D. Frangopoulos, Lucas M. Venter, Mariki M. Eloff, University of South
Africa , South Africa
 |
|
Stream 7:
(Research-in-progress Papers)
Session Chairperson: |
Stream 8:
(Research-in-progress Papers)
Session Chairperson: |
Stream 9:
(Research-in-progress Papers)
Session Chairperson: |
17:00-17:15 |
Purpose
Organisation, Wynand van Staden, Martin Olivier, University of Johannesburg,
South Africa
 |
A Framework for
evaluating Information Security Risk Management Methodologies for SMMEs,
Liesl van Niekerk, L Labuschagne , University of Johannesburg, South Africa
 |
Hardware
Implementation of AES-CCM for Robust Secure Wireless Network , Arshad Aziz,
Habib Rehmatullah, National University of Sciences and Technology, Pakistan
Navy Engineering College, Pakistan
 |
17:15-17:30 |
Proposing a
Secure XACML architecture ensuring privacy and trust Yared Keleta, M.
Coetzee , J.H.P Eloff, H.S Venter, University of Pretoria, South Africa
 |
An
Investigation of Information Security in Small and Medium Enterprises (SME’s)
in the Eastern Cape, Chris Upfold, Rhodes University, South Africa
 |
A Model for
Spam Prevention in Voice over IP Networks using Anonymous Verifying
Authorities, Neil Croft, University of Pretoria, South Africa
 |
17:30-17:45 |
File Integrity
Checkers: State of the Art and Best Practices, Yusuf M Motara, Barry Irwin,
Rhodes University, South Africa
 |
An
Investigating into Information Security compliance regulations in the South
African financial sector, Rabbie Maphakela, D. Pottas & Rossouw von Solms,
Nelson Mandela Metropolitan University, South Africa
 |
Security Scheme
for Mobile Agent System in E-Commerce Scenario, Rajwinder Singh, A.K.Sarje,
Indian Institute of Technology Roorkee, India
 |
17:45-18:00 |
|
Security of
Real-Time Multimedia: A brief survey, Bradley Clayton, Barry Irwin & Alfredo Terzoli , Rhodes University, South Africa
 |
A more secure
e-commerce environment based on a self-contained biometric USB memory stick, Darek Janiszyn, Basie von Solms, University of Johannesburg, South Africa
 |