Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output
Research articles in refereed specialist journals:
Eloff JHP, Granova A: 2003. Computer Crime Case Analysis. Computer Fraud and Security, / October.
Johnston J, Eloff JHP, Labuschagne L: 2003. Security and human computer interfaces. Computers and Security, 22 (8) / Dec, pp 675-684.
Venter HS, Eloff JHP: 2003. A taxonomy for information security technologies. Computers and Security, 22 (4), pp 299-307.
Venter HS, Eloff JHP: 2003. Assessment of Vulnerability Scanners. Network Security, 2003 (2) / February, pp 11-16.
Olivier MS: 2003. Database Privacy. SIGKDD Explorations, 4 (2) / January, pp 20-27.
Venter HS, Eloff JHP: 2003. Evaluating Vulnerability Scanners Using Harmonised Vulnerability Categories. South African Computer Journal/Suid-Afrikaanse Rekenaartydskrif, (31) / Dec, pp 40-45.
Olivier MS: 2003. A Layered Architecture for Privacy-enhancing Technologies. South African Computer Journal/Suid-Afrikaanse Rekenaartydskrif, (31) / Dec, pp 53-61.
Papers in refereed, published conference proceedings:
Eloff MM, Eloff JHP: 2003. Information Security Management System: Processes and Products. In Proceedings of IFIP TC11 18th International Conference on Information Security (SEC2003): Security and Privacy in the Age of Uncertainty, Kluwer Academic Publishers, pp 193-204.
Olivier MS: 2003. Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data. In Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2003): IT Research in Developing Countries, South African Institute of Computer Scientists and Information Technologists (SAICSIT), pp 275-284.
Coetzee M, Eloff JHP: 2003. Virtual Enterprise Access Control Requirements. In Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2003): IT Research in Developing Countries, South African Institute of Computer Scientists and Information Technologists (SAICSIT), pp 285-294.
Eloff JHP, Eloff MM: 2003. Information Security Management - A New Paradigm. In Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2003): IT Research in Developing Countries, South African Institute of Computer Scientists and Information Technologists (SAICSIT), pp 130-136.
Dreyer L, Olivier MS: 2003. Implementing Workflow Systems. In Proceedings of the IFIP TC11 / WG11.3 16th Annual Conference on Data and Applications Security: Research Directions in Database and Applications Security, Kluwer Academic Publishers, pp 61-72.
Chadwick D, Olivier MS, Samarati P, Sharpston E, Thuraisingham B: 2003. Privacy and Civil Liberties. In Proceedings of the IFIP TC11 / WG11.3 16th Annual Conference on Data and Applications Security: Research Directions in Database and Applications Security, Kluwer Academic Publishers, pp 331-346.
Venter HS, Eloff JHP: 2003. State of the Art Vulnerability Detection and Suggestions for Improvement. In Proceedings of the ITI First International Conference on Information and Communication Technology (ICICT2003): Ensuring Security in IT Infrastructures, Information Technology Institute, Egypt, pp 261-273.
Olivier MS: 2003. A Layered Architecture for Privacy-enhancing Technologies. In Proceedings of the Third Annual Information Security South Africa Conference (ISSA2003), Information Security South Africa (ISSA), pp 113-126.
Venter HS, Eloff JHP: 2003. Vulnerability Detection. In Proceedings of the Third Annual Information Security South Africa Conference (ISSA2003), Information Security South Africa (ISSA), pp 89-98.
Coetzee M, Eloff JHP: 2003. Access Control for Web Services. In Proceedings of the Third Annual Information Security South Africa Conference (ISSA2003), Information Security South Africa (ISSA), pp 99-112.
|