2008 |
84 | | Hein S. Venter,
Mariki M. Eloff,
Jan H. P. Eloff,
Les Labuschagne:
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008
ISSA, Pretoria, South Africa 2008 |
83 | EE | Kweku K. Arthur,
Martin S. Olivier,
Hein S. Venter,
Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System.
ARES 2008: 1388-1393 |
82 | EE | Michal Köhn,
Jan H. P. Eloff,
Martin S. Olivier:
UML Modelling of Digital Forensic Process Models (DFPMs).
ISSA 2008: 1-13 |
81 | EE | Namosha Veerasamy,
Jan H. P. Eloff:
Towards a Framework for a Network Warfare Capability.
ISSA 2008: 1-18 |
80 | EE | Hein S. Venter,
Jan H. P. Eloff,
Y. L. Li:
Standardising vulnerability categories.
Computers & Security 27(3-4): 71-83 (2008) |
79 | EE | Johnny Li-Chang Lo,
Judith Bishop,
Jan H. P. Eloff:
SMSSec: An end-to-end protocol for secure SMS.
Computers & Security 27(5-6): 154-167 (2008) |
2007 |
78 | | Hein S. Venter,
Mariki M. Eloff,
Les Labuschagne,
Jan H. P. Eloff,
Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
Springer 2007 |
77 | EE | Emmanuel A. Adigun,
Jan H. P. Eloff:
Defining a Trusted Service-Oriented Network Environment.
ARES 2007: 1245-1250 |
76 | | Keshnee Padayachee,
Jan H. P. Eloff:
An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report.
IMECS 2007: 1060-1065 |
75 | EE | T. J. Grant,
H. S. Venter,
Jan H. P. Eloff:
Simulating adversarial interactions between intruders and system administrators using OODA-RR.
SAICSIT Conf. 2007: 46-55 |
74 | EE | A. Maciej Rossudowski,
Hein S. Venter,
Jan H. P. Eloff:
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis.
SEC 2007: 217-228 |
73 | EE | Marijke Coetzee,
Jan H. P. Eloff:
A Trust and Context Aware Access Control Model for Web Services Conversations.
TrustBus 2007: 115-124 |
72 | EE | Keshnee Padayachee,
Jan H. P. Eloff:
Enhancing Optimistic Access Controls with Usage Control.
TrustBus 2007: 75-82 |
71 | EE | A. Da Veiga,
Jan H. P. Eloff:
An Information Security Governance Framework.
IS Management 24(4): 361-372 (2007) |
2006 |
70 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2006 |
69 | EE | Sergei A. Obiedkov,
Derrick G. Kourie,
Jan H. P. Eloff:
On Lattices in Access Control Models.
ICCS 2006: 374-387 |
68 | | Bennie Fei,
Jan H. P. Eloff,
Martin S. Olivier,
Hein S. Venter:
Analysis of Web Proxy Logs.
IFIP Int. Conf. Digital Forensics 2006: 247-258 |
67 | | Marika Wojcik,
Hein S. Venter,
Jan H. P. Eloff,
Martin S. Olivier:
Applying Machine Trust Models to Forensic Investigations.
IFIP Int. Conf. Digital Forensics 2006: 55-65 |
66 | EE | Leonie McManus,
Jan H. P. Eloff:
Using IT Benchmarking Principles to Design an Information Security Benchmark Model.
ISSA 2006: 1-11 |
65 | EE | Michael Kohn,
Martin S. Olivier,
Jan H. P. Eloff:
Framework for a Digital Forensic Investigation.
ISSA 2006: 1-7 |
64 | EE | T. Morkel,
Jan H. P. Eloff,
Martin S. Olivier:
Using Image Steganography for Decryptor Distribution.
OTM Workshops (1) 2006: 322-330 |
63 | EE | Marijke Coetzee,
Jan H. P. Eloff:
A Framework for Web Services Trust.
SEC 2006: 74-86 |
62 | EE | Marika Wojcik,
Jan H. P. Eloff,
H. S. Venter:
Trust Model Architecture: Defining Prejudice by Learning.
TrustBus 2006: 182-191 |
61 | EE | Vafa D. Izadinia,
Derrick G. Kourie,
Jan H. P. Eloff:
Uncovering identities: A study into VPN tunnel fingerprinting.
Computers & Security 25(2): 97-105 (2006) |
2005 |
60 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2005 |
59 | | Rut Laubscher,
Cobus Rabe,
Martin S. Olivier,
Jan H. P. Eloff,
H. S. Venter:
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.
IFIP Int. Conf. Digital Forensics 2005: 105-112 |
58 | | Bennie Fei,
Jan H. P. Eloff,
H. S. Venter,
Martin S. Olivier:
Exploring Forensic Data with Self-Organizing Maps.
IFIP Int. Conf. Digital Forensics 2005: 113-123 |
57 | EE | M. Loock,
Jan H. P. Eloff:
A new Access Control model based on the Chinese Wall Security Policy Model.
ISSA 2005: 1-10 |
56 | EE | T. Morkel,
Jan H. P. Eloff,
Martin S. Olivier:
An overview of image steganography.
ISSA 2005: 1-11 |
55 | EE | Marijke Coetzee,
Jan H. P. Eloff:
Metadata for trust in service-oriented architectures.
ISSA 2005: 1-12 |
54 | EE | Vafa D. Izadinia,
Jan H. P. Eloff,
Derrick G. Kourie:
Foiling an Attack - Defeating IPSec Tunnel Fingerprinting.
ISSA 2005: 1-14 |
2004 |
53 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa
ISSA, Pretoria, South Africa 2004 |
52 | | Paula Kotzé,
Mariki M. Eloff,
Ayodele Adesina-Ojo,
Jan H. P. Eloff:
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics.
ICEIS (5) 2004: 97-106 |
51 | EE | H. S. Venter,
Jan H. P. Eloff:
Vulnerability forecasting - a conceptual model.
Computers & Security 23(6): 489-497 (2004) |
50 | EE | Marijke Coetzee,
Jan H. P. Eloff:
Towards Web Service access control.
Computers & Security 23(7): 559-570 (2004) |
2003 |
49 | | Mariki M. Eloff,
Jan H. P. Eloff:
Information Security Management System: Processes and Products.
SEC 2003: 193-204 |
48 | EE | H. S. Venter,
Jan H. P. Eloff:
A taxonomy for information security technologies.
Computers & Security 22(4): 299-307 (2003) |
47 | EE | J. Johnston,
Jan H. P. Eloff,
Les Labuschagne:
Security and human computer interfaces.
Computers & Security 22(8): 675-684 (2003) |
46 | | H. S. Venter,
Jan H. P. Eloff:
Evaluating vulnerability scanners using harmonised vulnerability categories.
South African Computer Journal 31: 40-45 (2003) |
2002 |
45 | | A. Martins,
Jan H. P. Eloff:
Information Security Culture.
SEC 2002: 203-214 |
44 | | Marijke Coetzee,
Jan H. P. Eloff:
Secure Database Connectivity on the WWW.
SEC 2002: 275-286 |
43 | | Mariki M. Eloff,
Jan H. P. Eloff:
Human Computer Interaction: An Information Security Perspectives.
SEC 2002: 535-546 |
42 | | Elmé Smith,
Jan H. P. Eloff:
A Prototype for Assessing Information Technology Risks in Health Care.
Computers & Security 21(3): 266-284 (2002) |
41 | | Karin Höne,
Jan H. P. Eloff:
Information security policy what do international information security standards say?
Computers & Security 21(5): 402-409 (2002) |
40 | | H. S. Venter,
Jan H. P. Eloff:
Vulnerabilities categories for intrusion detection system.
Computers & Security 21(7): 617-619 (2002) |
39 | | Reinhardt A. Botha,
Jan H. P. Eloff:
An access control architecture for XML documents in workflow environments.
South African Computer Journal 28: 3-10 (2002) |
38 | | H. S. Venter,
Jan H. P. Eloff:
Harmonising vulnerability categories.
South African Computer Journal 29: 24-31 (2002) |
2001 |
37 | | Jan H. P. Eloff,
Les Labuschagne,
Rossouw von Solms,
Gurpreet Dhillon:
Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA
Kluwer 2001 |
36 | EE | Reinhardt A. Botha,
Jan H. P. Eloff:
Designing Role Hierarchies for Access Control in Workflow Systems.
COMPSAC 2001: 117-122 |
35 | | Elmé Smith,
Jan H. P. Eloff:
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques.
Conference on Information Security Management & Small Systems Security 2001: 141-156 |
34 | | Les Labuschagne,
Jan H. P. Eloff:
E-Commerce Strategy Formulation.
I3E 2001: 289-302 |
33 | | C. M. Trompeter,
Jan H. P. Eloff:
A Framework for the Implementation of Socio-ethical Controls in Information Security.
Computers & Security 20(5): 384-391 (2001) |
32 | | Reinhardt A. Botha,
Jan H. P. Eloff:
Access Control in Document-centric Workflow Systems An Agent-based Approach.
Computers & Security 20(6): 525-532 (2001) |
31 | EE | Reinhardt A. Botha,
Jan H. P. Eloff:
Separation of duties for access control enforcement in workflow environments.
IBM Systems Journal 40(3): 666-682 (2001) |
30 | EE | Reinhardt A. Botha,
Jan H. P. Eloff:
A framework for access control in workflow systems.
Inf. Manag. Comput. Security 9(3): 126-133 (2001) |
29 | | Elmé Smith,
Jan H. P. Eloff:
A new approach to risk management in the health-care domain.
South African Computer Journal 27: 2-11 (2001) |
28 | | S. Perelson,
Reinhardt A. Botha,
Jan H. P. Eloff:
Separation of Duty administration.
South African Computer Journal 27: 64-69 (2001) |
2000 |
27 | | Sihan Qing,
Jan H. P. Eloff:
Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China
Kluwer 2000 |
26 | | Alida Liebenberg,
Jan H. P. Eloff:
MASS: Model for an Auditing Security System.
SEC 2000: 141-150 |
25 | | Damian G. Cholewka,
Reinhardt A. Botha,
Jan H. P. Eloff:
A Context-Sensitive Access Control Model and Prototype Implementation.
SEC 2000: 341-350 |
24 | EE | Elmé Smith,
Jan H. P. Eloff:
Cognitive Fuzzy Modeling for Enhanced Risk Assessment in a Health Care Institution.
IEEE Intelligent Systems 15(2): 69-75 (2000) |
23 | EE | Les Labuschagne,
Jan H. P. Eloff:
Electronic commerce: the information-security challenge.
Inf. Manag. Comput. Security 8(3): 154-157 (2000) |
1999 |
22 | | Jan H. P. Eloff,
Les Labuschagne,
Rossouw von Solms,
Jan Verschuren:
Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands
Kluwer 1999 |
21 | | H. S. Venter,
Les Labuschagne,
Jan H. P. Eloff:
Real-time Risk Analysis on the Internet: a prototype.
Conference on Information Security Management & Small Systems Security 1999: 11-28 |
1998 |
20 | EE | Gert van der Merwe,
Jan H. P. Eloff:
Software source code, visual risk analysis: an example.
Computers & Security 17(3): 233-252 (1998) |
19 | EE | Les Labuschagne,
Jan H. P. Eloff:
The use of real-time risk analysis to enable dynamic activation of countermeasures.
Computers & Security 17(4): 347-357 (1998) |
18 | EE | H. S. Venter,
Jan H. P. Eloff:
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools.
Computers & Security 17(8): 683-692 (1998) |
17 | EE | Les Labuschagne,
Jan H. P. Eloff:
Real-time risk analysis using Java concepts.
Inf. Manag. Comput. Security 6(5): 212-217 (1998) |
1997 |
16 | | R. Kruger,
Jan H. P. Eloff:
A common criteria framework for the evaluation of information technology systems security.
SEC 1997: 197-209 |
15 | | Jan H. P. Eloff,
R. Körner:
A methodology for accrediting a commercial distributed database.
SEC 1997: 210-221 |
14 | EE | Les Labuschagne,
Jan H. P. Eloff:
Improved system-access control using complementary technologies.
Computers & Security 16(6): 543-549 (1997) |
13 | | Willem G. de Ru,
Jan H. P. Eloff:
Enhanced Password Authentication through Fuzzy Logic.
IEEE Expert 12(6): 38-45 (1997) |
1996 |
12 | | Les Labuschagne,
Jan H. P. Eloff:
Activating dynamic counter measures to reduce risk.
SEC 1996: 187-196 |
11 | EE | Jan H. P. Eloff,
Ralph Holbein,
Stephanie Teufel:
Security classification for documents.
Computers & Security 15(1): 55-71 (1996) |
10 | EE | Willem G. de Ru,
Jan H. P. Eloff:
Risk analysis modelling with the use of fuzzy logic.
Computers & Security 15(3): 239-248 (1996) |
1995 |
9 | | Stephanie Teufel,
Jan H. P. Eloff,
Kurt Bauknecht,
Dimitris Karagiannis:
Information Security Concepts in Computer Supported Cooperative Work
DEXA 1995: 621-631 |
8 | EE | H. A. S. Booysen,
Jan H. P. Eloff:
Classification of objects for improved access control.
Computers & Security 14(3): 251-265 (1995) |
1994 |
7 | EE | Karin P. Badenhorst,
Jan H. P. Eloff:
TOPM: a formal approach to the optimization of information technology risk management.
Computers & Security 13(5): 411-435 (1994) |
1993 |
6 | | J. P. Klut,
Jan H. P. Eloff:
MethoDex: A Methodology for Expert Systems Development.
ISMIS 1993: 106-115 |
5 | | C. J. Bosch,
Jan H. P. Eloff,
John M. Carroll:
International Standards and Organizational Security Needs: Bridging the Gap.
SEC 1993: 171-183 |
4 | EE | Jan H. P. Eloff,
Les Labuschagne,
Karin P. Badenhorst:
A comparative framework for risk analysis methods.
Computers & Security 12(6): 597-603 (1993) |
1990 |
3 | EE | Karin P. Badenhorst,
Jan H. P. Eloff:
Computer security methodology: Risk analysis and project definition.
Computers & Security 9(4): 339-346 (1990) |
1989 |
2 | EE | Karin P. Badenhorst,
Jan H. P. Eloff:
Framework of a methodology for the life cycle of computer security in an organization.
Computers & Security 8(5): 433-442 (1989) |
1 | EE | D. N. J. Mostert,
Jan H. P. Eloff,
Sebastiaan H. von Solms:
A methodology for measuring user satisfaction.
Inf. Process. Manage. 25(5): 545-556 (1989) |