6. ISSA 2006:
Sandton,
South Africa
Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter (Eds.):
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa.
ISSA, Pretoria, South Africa 2006, ISBN 1-86854-636-5 BibTeX
- Demetrios Loutsios, Maree Pather:
A Brokered Approach to Interoperable Security in OGSA-Based Grid Systems.
1-11
Electronic Edition (link) BibTeX
- Hennie A. Kruger, Lynette Drevin, Tjaart Steyn:
A Framework for Evaluating ICT Security Awareness.
1-11
Electronic Edition (link) BibTeX
- Abdullah Haroon Rasheed, Muhammad Essam, Umair Khalid, Shoab A. Khan, Sheikh M. Farhan:
A Low Bit Architecture for a Very Compact Hardware Implementation of the AES Algorithm.
1-8
Electronic Edition (link) BibTeX
- Jacobus A. Ophoff, Stephen Perelson, Reinhardt Botha:
A Model for Secure Value-Added Service Subscriptions in Cellular Networks.
1-9
Electronic Edition (link) BibTeX
- Thomas McDonald van der Merwe:
A Profile of The Distance Computing Student Softlifter.
1-20
Electronic Edition (link) BibTeX
- Charles N. Tarimo, Jabiri Kuwe Bakari, Louise Yngström, Stewart Kowalski:
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security The Case of Tanzania.
1-12
Electronic Edition (link) BibTeX
- Andreas U. Schmidt, Jan Piechalski:
Authorised Translations of Electronic Documents.
1-14
Electronic Edition (link) BibTeX
- Dirk Willie du Preez, Vreda Pieterse:
Calculating Compliance Standards.
1-11
Electronic Edition (link) BibTeX
- Torsten Braun, Christoph Graf, Ulrich Ultes-Nitsche, Aurelius Baier, Thomas Bernoulli:
Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project.
1-10
Electronic Edition (link) BibTeX
- Kennedy Nduati Njenga, Irwin Brown:
Conceptualising the Influence of Tacit Knowledge in Security Risk Management Activities.
1-12
Electronic Edition (link) BibTeX
- Kate Ormiston, Mariki M. Eloff:
Denial-of-Service & Distributed Denial-of-Service on The Internet.
1-14
Electronic Edition (link) BibTeX
- Michael Kohn, Martin S. Olivier, Jan H. P. Eloff:
Framework for a Digital Forensic Investigation.
1-7
Electronic Edition (link) BibTeX
- Jeffy Mwakalinga, Louise Yngström:
Framework for Securing Mobile Software Agents.
1-12
Electronic Edition (link) BibTeX
- Jean-Pierre van Riel, Barry Irwin:
Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot.
1-12
Electronic Edition (link) BibTeX
- Verine Etsebeth:
Information Security Policies - The Legal Risk of Uninformed Personnel.
1-10
Electronic Edition (link) BibTeX
- Bradley Clayton, Barry Irwin, Alfredo Terzoli:
Integrating Secure RTP into the Open Source VoIP PBX Asterisk.
1-12
Electronic Edition (link) BibTeX
- Murdoch Watney:
Justifiability of State Surveillance of the Internet as E-Security Mechanism.
1-11
Electronic Edition (link) BibTeX
- Dominic White, Barry Irwin:
Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks?
1-18
Electronic Edition (link) BibTeX
- Wesley Brandi, Martin S. Olivier:
On bidder zones, cell phones and ballot stuffing.
1-11
Electronic Edition (link) BibTeX
- Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström:
Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World.
1-11
Electronic Edition (link) BibTeX
- Alf Zugenmaier, Anand R. Prasad, Julien Laganier:
Performance Analysis of a Secure Seamless Handover Mechanism in All-IP Networks.
1-11
Electronic Edition (link) BibTeX
- Mark Branagan, Robert Dawson, Dennis Longley:
Security Risk Analysis for Complex Systems.
1-12
Electronic Edition (link) BibTeX
- Neil Croft, Martin S. Olivier:
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation.
1-14
Electronic Edition (link) BibTeX
- Fred Otten, Barry Irwin, Hannah Slay:
The Need for Centralised, Cross Platform Information Aggregation.
1-12
Electronic Edition (link) BibTeX
- Mkhululi Tyukala, Dalenca Pottas, Rossouw von Solms, Helen van de Haar:
The Organisational Information Security Profile - A Tool to Assist The Board.
1-13
Electronic Edition (link) BibTeX
- Liesl van Niekerk, Les Labuschagne:
The Peculium Model: Information Security Risk Management for the South African SMME.
1-14
Electronic Edition (link) BibTeX
- Alapan Arnab, Andrew Hutchison:
Ticket Based Identity System for DRM.
1-10
Electronic Edition (link) BibTeX
- Rabbie Maphakela, Dalenca Pottas:
Towards Regulatory Compliance - A model for the South African Financial Sector.
1-11
Electronic Edition (link) BibTeX
- Reijo Savola:
Towards Security Evaluation based on Evidence Collection.
1-10
Electronic Edition (link) BibTeX
- Nicolai Kuntze, Andreas U. Schmidt:
Trusted Computing in Mobile Action.
1-12
Electronic Edition (link) BibTeX
- Johan Van Niekerk, Rossouw von Solms:
Understanding Information Security Culture: A Conceptual Framework.
1-10
Electronic Edition (link) BibTeX
- Frank Innerhofer-Oberperfler, Ruth Breu:
Using an Enterprise Architecture for IT Risk Management.
1-12
Electronic Edition (link) BibTeX
- Leonie McManus, Jan H. P. Eloff:
Using IT Benchmarking Principles to Design an Information Security Benchmark Model.
1-11
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:26:19 2009
by Michael Ley (ley@uni-trier.de)