Table of Contents - Day 2 - Tuesday 3 August 2010

 

Stream 7 –  
(
Reviewed Papers)

Stream 8

(Reviewed Papers)

A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology

Anass Bayaga and Stephen Flowerday

A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System

Oliver Spycher and Rolf Haenni

A framework for evaluating IT security investments in a banking environment

Eugene Smith and Hennie Kruger

Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information

Ziyad Al-Salloum and Stephen Wolthusen

Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance

Reijo Savola, Heimo Pentikäinen and Moussa Ouedraogo

Towards an Information Security Framework for Service-oriented Architecture

Jacqui Chetty and Marijke Coetzee

Stream 9 -
(
Reviewed Papers)

Stream 10 -
(
Reviewed Papers)

Broadband broadens scope for cyber crime in Africa

Marthie Grobler and Joey Jansen van Vuuren

Deep Packet Inspection – Fear of the Unknown

Ryan Goss and Reinhardt Botha

Mobile Security from an Information Warfare Perspective

Brett van Niekerk and Manoj Maharaj

The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation

Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch and Harald Baier

Common problems faced during the establishment of a CSIRT

Marthie Grobler and Harri Bryk

An investigation and survey of response options for Intrusion Response Systems (IRSs)

Nor Badrul Anuar, Maria Papadaki, Steve Furnell and Nathan Clarke