Research 2004

Research Interest Home

Researchers Involved

Research Output

Postgraduate Student Projects

Back To

Department Research Interests

 

Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science

Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output

Research articles in refereed specialist journals:

Granova A, Eloff JHP: 2004. Online banking and identity theft: Who carries the risk?. Computer Fraud and Security, 2004 (11) / Nov, pp 7-11.

Coetzee M, Eloff JHP: 2004. Towards Web Service access control. Computers & Security, 23 (7), pp 559-570.

Venter HS, Eloff JHP: 2004. Vulnerability forecasting - a conceptual model. Computers & Security, 23 (6) / Sept, pp 489-497.

Venter HS, Olivier MS, Eloff JHP: 2004. PIDS: A privacy intrusion detection system. Internet Research-Electronic Networking Applications and Policy, 14 (5), pp 360-365.

Olivier MS: 2004. Using Organisational Safeguards to make Justifiable Privacy Decisions when Processing Personal Data. South African Computer Journal, 33 / Dec, pp 77-87.

Papers in refereed, published conference proceedings:

Rutherford A, Botha R, Olivier MS: 2004. Towards a Hippocratic Log File Architecture. In Proceedings of SAICSIT 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, South African Institute of Computer Scientists and Information Technologists, pp 186-193.

Olivier MS: 2004. Flocks: Distributed Proxies for Browsing Privacy. In Proceedings of SAICSIT 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, South African Institute of Computer Scientists and Information Technologists, pp 79-88.

Pillai MM, Eloff JHP, Venter HS: 2004. An Approach to implement a Network Intrusion Detection System using Genetic Algorithms. In Proceedings of SAICSIT 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, South African Institute of Computer Scientists and Information Technologists, pp 221-228.

Olivier MS: 2004. Privacy under Conditions of Concurrent Interaction with Multiple Parties. In Proceedings of the 17th Annual IFIP TC11/WG 11.3 Working Conference on Data and Applications Security, Kluwer Academic Publishers, pp 105-118.

Coetzee M, Eloff JHP: 2004. Access control for networked Web Services. In Proceedings of the Fourth International Network Conference (INC 2004), University of Plymouth, pp 271-278.

Arthur KK, Venter HS: 2004. An Investigation into Computer Forensic Tools. In Proceedings of the ISSA 2004 Enabling Tomorrow Conference, Information Security South Africa (ISSA), pp 1-11.

Li Y, Venter HS, Eloff JHP: 2004. Categorizing vulnerabilities using data clustering techniques. In Proceedings of the ISSA 2004 Enabling Tomorrow Conference, Information Security South Africa (ISSA), pp 1-11.

Granova A, Eloff JHP: 2004. South African Online Banking: Who Carries the Risk?. In Proceedings of the ISSA 2004 Enabling Tomorrow Conference, Information Security South Africa (ISSA), pp 1-12.

Coetzee M, Eloff JHP: 2004. A Logic-Based Access Control Approach for Web Services. In Proceedings of the ISSA 2004 Enabling Tomorrow Conference, Information Security South Africa (ISSA), pp 1-11.

Kotze P, Eloff MM, Adesina-Ojo A, Eloff JHP: 2004. Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics. In Sixth International Conference on Enterprise Information Systems (ICEIS), INSTICC Press, pp 97-106.

 

Related Links

Department of Computer Science Home Page