Table of Contents - Day 1 of Conference Programme

Day 1 – Monday, 6 July 2009

 

Stream 1 –
(
Reviewed Papers)

Stream 2 –
(Reviewed Papers)

Stream 3
(Research in Progress; not part of official proceedings)

13:30-14:00

A Theoretical Approach to Live Forensic Acquisition

Marthie Grobler and Basie von Solms

BC3I – Towards Requirements Specification for Preparing an Information Security Budget

Moses Dlamini, Mariki Eloff, Jan Eloff and Karin Hohne

 
 

14:00-14:30

A high-level overview for Digital Forensics

Cornelia Grobler and Buks Louwrens

Identification of Basic Measurable Security Components in Software-Intensive Systems

Reijo Savola

 
 

14:30-15:00

The Design of a Wireless Forensic Readiness Model (WFRM)

Sipho Josia Ngobeni and Hein Venter

Discussing E-Government Maturity Models for the Developing World

Geoffrey Karokola and Louise Yngström

 
 

15:00-15:30

Tea 

 

Stream 4
(
Reviewed Papers)

Stream 5
(Reviewed Papers)

Stream 6
(Research in Progress; not part of official proceedings)

15:30–16:00 

Investigating the effect of Genetic Algorithms on filter optimisation within fast packet classifiers

Alastair Nottingham and Barry Irwin

A Framework for Web Services Security Policy Negotiation

Tristan Lavarack and Marijke Coetzee

 

 
 

16:00-16:30

Help Us! We Want to be ‘E-Secured’: Digital Banking Customers’ Security Needs in South Africa

Arthur Goldstuck and Rabelani Dagada

How appropriate is k-anonymity for addressing the conflict between privacy and information utility in microdata anonymisation

Marek P. Zielinski and Martin S. Olivier

 
 

16:30-17:00

An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating SystemHaroon Meer

An analysis of authentication for passive RFID tags

Gregory Smith and Marijke Coetzee