dblp.uni-trier.dewww.uni-trier.de

Jan H. P. Eloff

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
84 Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne: Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008 ISSA, Pretoria, South Africa 2008
83EEKweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff: Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393
82EEMichal Köhn, Jan H. P. Eloff, Martin S. Olivier: UML Modelling of Digital Forensic Process Models (DFPMs). ISSA 2008: 1-13
81EENamosha Veerasamy, Jan H. P. Eloff: Towards a Framework for a Network Warfare Capability. ISSA 2008: 1-18
80EEHein S. Venter, Jan H. P. Eloff, Y. L. Li: Standardising vulnerability categories. Computers & Security 27(3-4): 71-83 (2008)
79EEJohnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff: SMSSec: An end-to-end protocol for secure SMS. Computers & Security 27(5-6): 154-167 (2008)
2007
78 Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa Springer 2007
77EEEmmanuel A. Adigun, Jan H. P. Eloff: Defining a Trusted Service-Oriented Network Environment. ARES 2007: 1245-1250
76 Keshnee Padayachee, Jan H. P. Eloff: An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report. IMECS 2007: 1060-1065
75EET. J. Grant, H. S. Venter, Jan H. P. Eloff: Simulating adversarial interactions between intruders and system administrators using OODA-RR. SAICSIT Conf. 2007: 46-55
74EEA. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff: Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. SEC 2007: 217-228
73EEMarijke Coetzee, Jan H. P. Eloff: A Trust and Context Aware Access Control Model for Web Services Conversations. TrustBus 2007: 115-124
72EEKeshnee Padayachee, Jan H. P. Eloff: Enhancing Optimistic Access Controls with Usage Control. TrustBus 2007: 75-82
71EEA. Da Veiga, Jan H. P. Eloff: An Information Security Governance Framework. IS Management 24(4): 361-372 (2007)
2006
70 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2006
69EESergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff: On Lattices in Access Control Models. ICCS 2006: 374-387
68 Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter: Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258
67 Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier: Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65
66EELeonie McManus, Jan H. P. Eloff: Using IT Benchmarking Principles to Design an Information Security Benchmark Model. ISSA 2006: 1-11
65EEMichael Kohn, Martin S. Olivier, Jan H. P. Eloff: Framework for a Digital Forensic Investigation. ISSA 2006: 1-7
64EET. Morkel, Jan H. P. Eloff, Martin S. Olivier: Using Image Steganography for Decryptor Distribution. OTM Workshops (1) 2006: 322-330
63EEMarijke Coetzee, Jan H. P. Eloff: A Framework for Web Services Trust. SEC 2006: 74-86
62EEMarika Wojcik, Jan H. P. Eloff, H. S. Venter: Trust Model Architecture: Defining Prejudice by Learning. TrustBus 2006: 182-191
61EEVafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff: Uncovering identities: A study into VPN tunnel fingerprinting. Computers & Security 25(2): 97-105 (2006)
2005
60 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2005
59 Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter: Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112
58 Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier: Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123
57EEM. Loock, Jan H. P. Eloff: A new Access Control model based on the Chinese Wall Security Policy Model. ISSA 2005: 1-10
56EET. Morkel, Jan H. P. Eloff, Martin S. Olivier: An overview of image steganography. ISSA 2005: 1-11
55EEMarijke Coetzee, Jan H. P. Eloff: Metadata for trust in service-oriented architectures. ISSA 2005: 1-12
54EEVafa D. Izadinia, Jan H. P. Eloff, Derrick G. Kourie: Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. ISSA 2005: 1-14
2004
53 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa ISSA, Pretoria, South Africa 2004
52 Paula Kotzé, Mariki M. Eloff, Ayodele Adesina-Ojo, Jan H. P. Eloff: Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics. ICEIS (5) 2004: 97-106
51EEH. S. Venter, Jan H. P. Eloff: Vulnerability forecasting - a conceptual model. Computers & Security 23(6): 489-497 (2004)
50EEMarijke Coetzee, Jan H. P. Eloff: Towards Web Service access control. Computers & Security 23(7): 559-570 (2004)
2003
49 Mariki M. Eloff, Jan H. P. Eloff: Information Security Management System: Processes and Products. SEC 2003: 193-204
48EEH. S. Venter, Jan H. P. Eloff: A taxonomy for information security technologies. Computers & Security 22(4): 299-307 (2003)
47EEJ. Johnston, Jan H. P. Eloff, Les Labuschagne: Security and human computer interfaces. Computers & Security 22(8): 675-684 (2003)
46 H. S. Venter, Jan H. P. Eloff: Evaluating vulnerability scanners using harmonised vulnerability categories. South African Computer Journal 31: 40-45 (2003)
2002
45 A. Martins, Jan H. P. Eloff: Information Security Culture. SEC 2002: 203-214
44 Marijke Coetzee, Jan H. P. Eloff: Secure Database Connectivity on the WWW. SEC 2002: 275-286
43 Mariki M. Eloff, Jan H. P. Eloff: Human Computer Interaction: An Information Security Perspectives. SEC 2002: 535-546
42 Elmé Smith, Jan H. P. Eloff: A Prototype for Assessing Information Technology Risks in Health Care. Computers & Security 21(3): 266-284 (2002)
41 Karin Höne, Jan H. P. Eloff: Information security policy what do international information security standards say? Computers & Security 21(5): 402-409 (2002)
40 H. S. Venter, Jan H. P. Eloff: Vulnerabilities categories for intrusion detection system. Computers & Security 21(7): 617-619 (2002)
39 Reinhardt A. Botha, Jan H. P. Eloff: An access control architecture for XML documents in workflow environments. South African Computer Journal 28: 3-10 (2002)
38 H. S. Venter, Jan H. P. Eloff: Harmonising vulnerability categories. South African Computer Journal 29: 24-31 (2002)
2001
37 Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon: Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA Kluwer 2001
36EEReinhardt A. Botha, Jan H. P. Eloff: Designing Role Hierarchies for Access Control in Workflow Systems. COMPSAC 2001: 117-122
35 Elmé Smith, Jan H. P. Eloff: Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques. Conference on Information Security Management & Small Systems Security 2001: 141-156
34 Les Labuschagne, Jan H. P. Eloff: E-Commerce Strategy Formulation. I3E 2001: 289-302
33 C. M. Trompeter, Jan H. P. Eloff: A Framework for the Implementation of Socio-ethical Controls in Information Security. Computers & Security 20(5): 384-391 (2001)
32 Reinhardt A. Botha, Jan H. P. Eloff: Access Control in Document-centric Workflow Systems An Agent-based Approach. Computers & Security 20(6): 525-532 (2001)
31EEReinhardt A. Botha, Jan H. P. Eloff: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3): 666-682 (2001)
30EEReinhardt A. Botha, Jan H. P. Eloff: A framework for access control in workflow systems. Inf. Manag. Comput. Security 9(3): 126-133 (2001)
29 Elmé Smith, Jan H. P. Eloff: A new approach to risk management in the health-care domain. South African Computer Journal 27: 2-11 (2001)
28 S. Perelson, Reinhardt A. Botha, Jan H. P. Eloff: Separation of Duty administration. South African Computer Journal 27: 64-69 (2001)
2000
27 Sihan Qing, Jan H. P. Eloff: Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China Kluwer 2000
26 Alida Liebenberg, Jan H. P. Eloff: MASS: Model for an Auditing Security System. SEC 2000: 141-150
25 Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff: A Context-Sensitive Access Control Model and Prototype Implementation. SEC 2000: 341-350
24EEElmé Smith, Jan H. P. Eloff: Cognitive Fuzzy Modeling for Enhanced Risk Assessment in a Health Care Institution. IEEE Intelligent Systems 15(2): 69-75 (2000)
23EELes Labuschagne, Jan H. P. Eloff: Electronic commerce: the information-security challenge. Inf. Manag. Comput. Security 8(3): 154-157 (2000)
1999
22 Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren: Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands Kluwer 1999
21 H. S. Venter, Les Labuschagne, Jan H. P. Eloff: Real-time Risk Analysis on the Internet: a prototype. Conference on Information Security Management & Small Systems Security 1999: 11-28
1998
20EEGert van der Merwe, Jan H. P. Eloff: Software source code, visual risk analysis: an example. Computers & Security 17(3): 233-252 (1998)
19EELes Labuschagne, Jan H. P. Eloff: The use of real-time risk analysis to enable dynamic activation of countermeasures. Computers & Security 17(4): 347-357 (1998)
18EEH. S. Venter, Jan H. P. Eloff: Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. Computers & Security 17(8): 683-692 (1998)
17EELes Labuschagne, Jan H. P. Eloff: Real-time risk analysis using Java concepts. Inf. Manag. Comput. Security 6(5): 212-217 (1998)
1997
16 R. Kruger, Jan H. P. Eloff: A common criteria framework for the evaluation of information technology systems security. SEC 1997: 197-209
15 Jan H. P. Eloff, R. Körner: A methodology for accrediting a commercial distributed database. SEC 1997: 210-221
14EELes Labuschagne, Jan H. P. Eloff: Improved system-access control using complementary technologies. Computers & Security 16(6): 543-549 (1997)
13 Willem G. de Ru, Jan H. P. Eloff: Enhanced Password Authentication through Fuzzy Logic. IEEE Expert 12(6): 38-45 (1997)
1996
12 Les Labuschagne, Jan H. P. Eloff: Activating dynamic counter measures to reduce risk. SEC 1996: 187-196
11EEJan H. P. Eloff, Ralph Holbein, Stephanie Teufel: Security classification for documents. Computers & Security 15(1): 55-71 (1996)
10EEWillem G. de Ru, Jan H. P. Eloff: Risk analysis modelling with the use of fuzzy logic. Computers & Security 15(3): 239-248 (1996)
1995
9 Stephanie Teufel, Jan H. P. Eloff, Kurt Bauknecht, Dimitris Karagiannis: Information Security Concepts in Computer Supported Cooperative Work DEXA 1995: 621-631
8EEH. A. S. Booysen, Jan H. P. Eloff: Classification of objects for improved access control. Computers & Security 14(3): 251-265 (1995)
1994
7EEKarin P. Badenhorst, Jan H. P. Eloff: TOPM: a formal approach to the optimization of information technology risk management. Computers & Security 13(5): 411-435 (1994)
1993
6 J. P. Klut, Jan H. P. Eloff: MethoDex: A Methodology for Expert Systems Development. ISMIS 1993: 106-115
5 C. J. Bosch, Jan H. P. Eloff, John M. Carroll: International Standards and Organizational Security Needs: Bridging the Gap. SEC 1993: 171-183
4EEJan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst: A comparative framework for risk analysis methods. Computers & Security 12(6): 597-603 (1993)
1990
3EEKarin P. Badenhorst, Jan H. P. Eloff: Computer security methodology: Risk analysis and project definition. Computers & Security 9(4): 339-346 (1990)
1989
2EEKarin P. Badenhorst, Jan H. P. Eloff: Framework of a methodology for the life cycle of computer security in an organization. Computers & Security 8(5): 433-442 (1989)
1EED. N. J. Mostert, Jan H. P. Eloff, Sebastiaan H. von Solms: A methodology for measuring user satisfaction. Inf. Process. Manage. 25(5): 545-556 (1989)

Coauthor Index

1Ayodele Adesina-Ojo [52]
2Emmanuel A. Adigun [77]
3Kweku K. Arthur [83]
4Karin P. Badenhorst [2] [3] [4] [7]
5Kurt Bauknecht [9]
6Judith Bishop [79]
7H. A. S. Booysen [8]
8C. J. Bosch [5]
9Reinhardt A. Botha [25] [28] [30] [31] [32] [36] [39]
10John M. Carroll [5]
11Damian G. Cholewka [25]
12Marijke Coetzee [44] [50] [55] [63] [73]
13Gurpreet Dhillon [37]
14Mariki M. Eloff [43] [49] [52] [53] [60] [70] [78] [84]
15Bennie Fei [58] [68]
16T. J. Grant [75]
17Ralph Holbein [11]
18Karin Höne [41]
19Vafa D. Izadinia [54] [61]
20J. Johnston [47]
21Dimitris Karagiannis [9]
22J. P. Klut [6]
23Michael Kohn [65]
24Michal Köhn [82]
25R. Körner [15]
26Paula Kotzé [52]
27Derrick G. Kourie [54] [61] [69]
28R. Kruger [16]
29Les Labuschagne [4] [12] [14] [17] [19] [21] [22] [23] [34] [37] [47] [53] [60] [70] [78] [84]
30Rut Laubscher [59]
31Y. L. Li [80]
32Alida Liebenberg [26]
33Johnny Li-Chang Lo [79]
34M. Loock [57]
35A. Martins [45]
36Leonie McManus [66]
37Gert van der Merwe [20]
38T. Morkel [56] [64]
39D. N. J. Mostert [1]
40Sergei A. Obiedkov [69]
41Martin S. Olivier [56] [58] [59] [64] [65] [67] [68] [82] [83]
42Keshnee Padayachee [72] [76]
43S. Perelson [28]
44Sihan Qing [27]
45Cobus Rabe [59]
46A. Maciej Rossudowski [74]
47Willem G. de Ru [10] [13]
48Elmé Smith [24] [29] [35] [42]
49Rossouw von Solms [22] [37] [78]
50Sebastiaan H. von Solms (Basie von Solms) [1]
51Stephanie Teufel [9] [11]
52C. M. Trompeter [33]
53Namosha Veerasamy [81]
54A. Da Veiga [71]
55Hein S. Venter (H. S. Venter) [18] [21] [38] [40] [46] [48] [51] [53] [58] [59] [60] [62] [67] [68] [70] [74] [75] [78] [80] [83] [84]
56Jan Verschuren [22]
57Marika Wojcik [62] [67]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)