Title |
Author(s) |
Affiliation |
Country |
A Brokered Approach to
Interoperable Security in OGSA-Based Grid Systems |
Demetrios Loutsios and Maree Pather |
Nelson Mandela Metropolitan University |
South Africa
 |
A Framework for Evaluating ICT
Security Awareness |
HA Kruger, L Drevin and T Steyn |
North West University |
South Africa
 |
A Low Bit Architecture for a
Very Compact Hardware Implementation of the AES Algorithm |
Abdullah Haroon Rasheed, Muhammad Essam, Umair Khalid, Shoab A. Khan and
Sheikh M. Farhan |
National University of Sciences and Technology |
Pakistan
 |
A Model for Secure Value-Added
Service Subscriptions in Cellular Networks |
Jacobus Ophoff, Stephen Perelson and Reinhardt Botha |
Nelson Mandela Metropolitan University |
South Africa
 |
A Profile of The Distance
Computing Student Softlifter |
Thomas Mc Donald van der Merwe |
University of South Africa |
South Africa
 |
A Social-Technical View of ICT
Security Issues, Trends, and Challenges: Towards a Culture of ICT
Security – The Case of Tanzania |
Charles Ndekarisho Tarimo, Jabiri Kuwe Bakari, Louise Yngström and
Stewart Kowalski |
Stockholm University |
Sweden
 |
Authorised Translations of
Electronic Documents |
Andreas U. Schmidt and Jan Piechalski |
Fraunhofer-Insitute for Secure Information Technology |
Germany
 |
Calculating Compliance Standards |
Dirk Willie du Preez and Vreda Pieterse |
University of Pretoria |
South Africa
 |
Case Study of the Usage of an
Authentication and Authorization Infrastructure (AAI) in an E-Learning
Project |
Torsten Braun, Christoph Graf, Ulrich Ultes-Nitsche, Aurelius Baier and
Thomas Bernoulli |
University of Fribourg |
Switzerland
 |
Conceptualising the Influence of
Tacit Knowledge in Security Risk Management Activities |
Kennedy Nduati Njenga and Irwin Brown |
University of Cape Town |
South Africa
 |
Denial-of-Service & Distributed
Denial-of-Service on The Internet |
Kate Ormiston and MM Eloff |
University of South Africa |
South Africa
 |
Framework for a Digital
Forensic Investigation |
Michael Kohn, Martin Olivier and JHP Eloff |
University of Pretoria |
South Africa
 |
Framework for Securing Mobile
Software Agents |
Jeffy Mwakalinga and Louise Yngström |
Royal Institute of Technology |
Sweden
 |
Identifying and Investigating
Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in
a 3-D Scatter-plot |
Jean-Pierre van Riel and Barry Irwin |
Rhodes University |
South Africa
 |
Information Security Policies -
The Legal Risk of Uninformed Personnel |
Verine Etsebeth |
University of Johannesburg |
South Africa
 |
Integrating Secure RTP into the
Open Source VoIP PBX Asterisk |
Bradley Clayton, Barry Irwin and Alfredo Terzoli |
Rhodes University |
South Africa
 |
Justifiability of State
Surveillance of the Internet as E-Security Mechanism |
Murdoch Watney |
University of Johannesburg |
South Africa
 |
Monthly Patch Release Schedules:
Do the Benefits Outweigh the Risks? |
Dominic White and Barry Irwin |
Rhodes University |
South Africa
 |
On bidder zones, cell phones and
ballot stuffing |
Wesley Brandi and Martin Olivier |
University of Pretoria |
South Africa
 |
Outsourcing ICT Security to
MSSP: Issues and Challenges for The Developing World |
Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo and Louise
Yngström |
Stockholm University |
Sweden
 |
Performance Analysis of a Secure
Seamless Handover Mechanism in All-IP Networks |
Alf Zugenmaier, Anand Prasad and Julien Laganier |
DoCoMo Euro-Labs |
Germany
 |
Security Risk Analysis for
Complex Systems |
Mark Branagan, Robert Dawson and Dennis Longley |
Queensland University of Technology |
Australia
 |
Sequenced Release of Privacy
Accurate Call Data Record Information in a GSM Forensic Investigation |
Neil Croft and Martin Olivier |
University of Pretoria |
South Africa
 |
The Need for Centralised, Cross
Platform Information Aggregation |
Fred Otten, Barry Irwin and Hannah Slay |
Rhodes University |
South Africa
 |
The Organisational Information
Security Profile - A Tool to Assist The Board |
Mkhululi Tyukala, Dalenca Pottas, Rossouw von Solms and Helen van de
Haar |
Nelson Mandela Metropolitan University |
South Africa
 |
The Peculium Model: Information
Security Risk Management for the South African SMME |
Liesl van Niekerk and Les Labuschagne |
University of Johannesburg |
South Africa
 |
Ticket Based Identity System for
DRM |
Alapan Arnab and Andrew Hutchison |
University of Cape Town |
South Africa
 |
Towards Regulatory Compliance -
A model for the South African Financial Sector |
Rabbie Maphakela and Dalenca Pottas |
Nelson Mandela Metropolitan University |
South Africa
 |
Towards Security Evaluation
based on Evidence Collection |
Reijo Savola |
VTT Technical Research Centre of Finland |
Finland
 |
Trusted Computing in Mobile
Action |
Nicolai Kuntze and Andreas U. Schmidt |
Fraunhofer-Insitute for Secure Information Technology |
Germany
 |
Understanding Information
Security Culture: A Conceptual Framework |
Johan Van Niekerk and Rossouw Von Solms |
Nelson Mandela Metropolitan University |
South Africa
 |
Using an Enterprise
Architecture for IT Risk Management |
Frank Innerhofer-Oberperfler and Ruth Breu |
University of Innsbruck |
Australia
 |
Using IT Benchmarking
Principles to Design an Information Security Benchmark Model |
Leonie McManus and Jan Eloff |
University of Pretoria |
South Africa
 |