Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Paper title
Author name Day 1 Day 2 Day 3
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 2 - Tuesday 3 August 2010
Stream 7 – (Reviewed Papers)
Stream 8 –
(Reviewed Papers)
A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology
Anass Bayaga and Stephen Flowerday
A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System
Oliver Spycher and Rolf Haenni
A framework for evaluating IT security investments in a banking environment
Eugene Smith and Hennie Kruger
Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information
Ziyad Al-Salloum and Stephen Wolthusen
Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance
Reijo Savola, Heimo Pentikäinen and Moussa Ouedraogo
Towards an Information Security Framework for Service-oriented Architecture
Jacqui Chetty and Marijke Coetzee
Stream 9 - (Reviewed Papers)
Stream 10 - (Reviewed Papers)
Broadband broadens scope for cyber crime in Africa
Marthie Grobler and Joey Jansen van Vuuren
Deep Packet Inspection – Fear of the Unknown
Ryan Goss and Reinhardt Botha
Mobile Security from an Information Warfare Perspective
Brett van Niekerk and Manoj Maharaj
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation
Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch and Harald Baier
Common problems faced during the establishment of a CSIRT
Marthie Grobler and Harri Bryk
An investigation and survey of response options for Intrusion Response Systems (IRSs)
Nor Badrul Anuar, Maria Papadaki, Steve Furnell and Nathan Clarke