Table of Contents - Day 2 - Tuesday 16 August 2011

 

Stream 7 –  
(
Reviewed Papers)

Stream 8
(
Reviewed Papers)

Stream 9 –
(Reviewed Papers)

 

Network and OS security

Session chair: Aubrey Labuschagne

Organizational security

Session chair: Professor Hennie Kruger

Trust

Session chair: Johan van Niekerk

 

13:00-13:30

A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network

Etienne Stalmans

Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data

Anne Kayem, Patrick Martin and Selim Akl

Analysing the fairness of trust-based Mobile Ad Hoc Network protocols

Ivan Burke, Renier van Heerden and Martin Olivier

 

13:30-14:00

An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs

Shaun Egan

A Property Based Security Risk Analysis Through Weighted Simulation
Timo Winkelvos, Carsten Rudolph and Jürgen Repp

Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures
Donovan Isherwood and Marijke Coetzee

 

14:00-14:30

Implementing Rootkits to address Operating System Vulnerabilities
Manuel Corregedor and Sebastiaan Von Solms

Exploring the Human Dimension of TETRA
Nico Pieter Fouche and Kerry-Lynn Thomson

Online Social Networks: Enhancing user trust through effective controls and identity management
Ryan Galpin and Stephen Flowerday

 

14:30-15:00

Tea

 

Stream 10 -
(
Reviewed Papers)

Stream 11 -
(
Reviewed Papers)

 

Digital forensics

Session chair: Etienne Stalmans

Security management and education

Session chair: Professor Stephen Flowerday

 

15:00–15:30

Adding Digital Forensic Readiness to Electronic Communication using a Security Monitoring Tool

Franscois Van Staden and Hein Venter

Information Security Competence Test with regards to Password Management
Paul Tarwireyi, Stephen Flowerday and Anass Bayaga

 

15:30-16:00

Network Forensics in a Clean-slate Internet Architecture
Tinus Strauss and Martin Olivier

A Visualization and Modeling Tool for Security Metrics and Measurements Management
Reijo Savola and Petri Heinonen

 

16:00-16:30

Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems
Aleksandar Valjarevic and Hein Venter

Guidelines for the Creation of Brain Compatible Cyber Security Educational Material in Moodle 2.0
Rayne Reid, Johan Van Niekerk and Rossouw Von Solms

 

16:30-17:00

Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness
Stephen Serra and HS Venter