Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Paper title
Author name Day 1 Day 2 Day 3
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 1 of Conference Programme
Day 1 – Monday, 6 July 2009
Stream 1 – (Reviewed Papers)
Stream 2 – (Reviewed Papers)
Stream 3 – (Research in Progress; not part of official proceedings)
13:30-14:00
A Theoretical Approach to Live Forensic Acquisition
Marthie Grobler and Basie von Solms
BC3I – Towards Requirements Specification for Preparing an Information Security Budget
Moses Dlamini, Mariki Eloff, Jan Eloff and Karin Hohne
14:00-14:30
A high-level overview for Digital Forensics
Cornelia Grobler and Buks Louwrens
Identification of Basic Measurable Security Components in Software-Intensive Systems
Reijo Savola
14:30-15:00
The Design of a Wireless Forensic Readiness Model (WFRM)
Sipho Josia Ngobeni and Hein Venter
Discussing E-Government Maturity Models for the Developing World
Geoffrey Karokola and Louise Yngström
15:00-15:30
Tea
Stream 4 – (Reviewed Papers)
Stream 5 – (Reviewed Papers)
Stream 6 – (Research in Progress; not part of official proceedings)
15:30–16:00
Investigating the effect of Genetic Algorithms on filter optimisation within fast packet classifiers
Alastair Nottingham and Barry Irwin
A Framework for Web Services Security Policy Negotiation
Tristan Lavarack and Marijke Coetzee
16:00-16:30
Help Us! We Want to be ‘E-Secured’: Digital Banking Customers’ Security Needs in South Africa
Arthur Goldstuck and Rabelani Dagada
How appropriate is k-anonymity for addressing the conflict between privacy and information utility in microdata anonymisation
Marek P. Zielinski and Martin S. Olivier
16:30-17:00
An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating SystemHaroon Meer
An analysis of authentication for passive RFID tags
Gregory Smith and Marijke Coetzee