5. ISSA 2005:
Sandton,
South Africa
Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter (Eds.):
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa.
ISSA, Pretoria, South Africa 2005, ISBN 1-86854-625-X BibTeX
- Job Asheri Chaula, Louise Yngström, Stewart Kowalski:
A Framework for Evaluation of Information Systems Security.
1-11
Electronic Edition (link) BibTeX
- Werner Bornman, Les Labuschagne:
A Framework for Information Security Risk Management Communication.
1-11
Electronic Edition (link) BibTeX
- Johan Van Niekerk, Rossouw von Solms:
A holistic framework for the fostering of an information security sub-culture in organizations.
1-13
Electronic Edition (link) BibTeX
- M. Loock, Jan H. P. Eloff:
A new Access Control model based on the Chinese Wall Security Policy Model.
1-10
Electronic Edition (link) BibTeX
- Eduardo Da Cruz, Les Labuschagne:
A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective.
1-12
Electronic Edition (link) BibTeX
- Carl Marnewick, Les Labuschagne:
A security framework for an ERP system.
1-15
Electronic Edition (link) BibTeX
- M. Jansen:
Access to copyrighted work: right or privelege?
1-11
Electronic Edition (link) BibTeX
- Norman Tinyiko Baloyi:
Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical.
1-12
Electronic Edition (link) BibTeX
- Charles N. Tarimo, Louise Yngström, Stewart Kowalski:
An approach to enhance the security of ICT infrastructure through legal, regulatory influences.
1-12
Electronic Edition (link) BibTeX
- S. A. Mlangeni, E. Biermann:
An assessment of Information Security Policies within the Polokwane area: A case study.
1-9
Electronic Edition (link) BibTeX
- T. Morkel, Jan H. P. Eloff, Martin S. Olivier:
An overview of image steganography.
1-11
Electronic Edition (link) BibTeX
- Marco Slaviero, Jaco Kroon, Martin S. Olivier:
Attacking Signed Binaries.
1-10
Electronic Edition (link) BibTeX
- Shingo Okamura, Maki Yoshida, Toru Fujiwara:
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors.
1-12
Electronic Edition (link) BibTeX
- Emile Parkin:
Cryptographic Key Management principles applied in South African Internet Banking.
1-12
Electronic Edition (link) BibTeX
- Dennis Longley, Mark Branagan:
Developing Threat Networks for Risk Analysis of Information Systems.
1-10
Electronic Edition (link) BibTeX
- Pieter Blaauw:
Fighting spam in a corporate environment using open-source solutions - a case study.
1-11
Electronic Edition (link) BibTeX
- Vafa D. Izadinia, Jan H. P. Eloff, Derrick G. Kourie:
Foiling an Attack - Defeating IPSec Tunnel Fingerprinting.
1-14
Electronic Edition (link) BibTeX
- Thomas Schlienger, Stephanie Teufel, Raphael Rues:
Information Security Culture Status Quo in Switzerland.
BibTeX
- T. Tuyikeze, Dalenca Pottas:
Information Security Management and Regulatory Compliance in the South African Health Sector.
1-12
Electronic Edition (link) BibTeX
- Christoff Breytenbach:
Introduction to Assessing and Securing Web Services.
1-14
Electronic Edition (link) BibTeX
- Fabio Ghioni:
Invasion of the RFIDs: are we heading towards Modern Times?
1-5
Electronic Edition (link) BibTeX
- Johann Hershensohn:
IT Forensics: the collection of and presentation of digital evidence.
1-14
Electronic Edition (link) BibTeX
- H. A. Kruger, W. D. Kearney:
Measuring Information Security Awareness - A West Africa Gold Mining Environment Case.
1-10
Electronic Edition (link) BibTeX
- William List, David Brewer:
Measuring the effectivness of an internal control system.
1-13
Electronic Edition (link) BibTeX
- Marijke Coetzee, Jan H. P. Eloff:
Metadata for trust in service-oriented architectures.
1-12
Electronic Edition (link) BibTeX
- Alapan Arnab, Andrew Hutchison:
Requirement Analysis of Enterprise DRM Systems.
1-14
Electronic Edition (link) BibTeX
- Jacques A. Ophoff, Reinhardt Botha:
Revisiting Reachability Management as a Multilateral Security Mechanism.
1-12
Electronic Edition (link) BibTeX
- Evangelos Frangopoulos, Lucas M. Venter, Mariki M. Eloff:
Secure Authentication combined with Anonymity: The end of an oxymoron?
1-11
Electronic Edition (link) BibTeX
- Maree Pather, L. M. Venter:
Securing SOAP Messages with a Global Message Handler and a Standardized Envelope.
1-13
Electronic Edition (link) BibTeX
- Andreas U. Schmidt, Nicolai Kuntze, Thomas Rauch:
Security for Distributed Web-Services via Aspect-Oriented Programming.
1-12
Electronic Edition (link) BibTeX
- Jeffy Mwakalinga, Louise Yngström:
Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system.
1-11
Electronic Edition (link) BibTeX
- R. Mulder, Rossouw von Solms:
The Proliferation of Wireless Devices and its Role in Corporate Governance.
1-11
Electronic Edition (link) BibTeX
- Russell Cloran, Barry Irwin:
Trust on the Web.
1-9
Electronic Edition (link) BibTeX
- Barry Irwin:
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams.
1-10 BibTeX
Copyright © Sat May 16 23:26:19 2009
by Michael Ley (ley@uni-trier.de)