dblp.uni-trier.dewww.uni-trier.de

Mariki M. Eloff

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15 Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne: Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008 ISSA, Pretoria, South Africa 2008
14EEEvangelos Frangopoulos, Mariki M. Eloff, Lucas M. Venter: Social Aspects of Information Security. ISSA 2008: 1-33
2007
13 Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa Springer 2007
2006
12 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2006
11EEKate Ormiston, Mariki M. Eloff: Denial-of-Service & Distributed Denial-of-Service on The Internet. ISSA 2006: 1-14
2005
10 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2005
9EEEvangelos Frangopoulos, Lucas M. Venter, Mariki M. Eloff: Secure Authentication combined with Anonymity: The end of an oxymoron? ISSA 2005: 1-11
2004
8 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa ISSA, Pretoria, South Africa 2004
7 Paula Kotzé, Mariki M. Eloff, Ayodele Adesina-Ojo, Jan H. P. Eloff: Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics. ICEIS (5) 2004: 97-106
2003
6 Mariki M. Eloff, Jan H. P. Eloff: Information Security Management System: Processes and Products. SEC 2003: 193-204
5 E. Smith, Mariki M. Eloff, Lucas M. Venter, A. Barnard, Laurette Pretorius: Agents, security and ethics : a framework for analysis. South African Computer Journal 31: 18-24 (2003)
2002
4 Mariki M. Eloff, Jan H. P. Eloff: Human Computer Interaction: An Information Security Perspectives. SEC 2002: 535-546
2000
3 Mariki M. Eloff, Sebastiaan H. von Solms: Information Security: Process Evaluation and Product Evaluation. SEC 2000: 11-18
2 Mariki M. Eloff, Sebastiaan H. von Solms: Information Security Management: A Hierarchical Framework for Various Approaches. Computers & Security 19(3): 243-256 (2000)
1 Mariki M. Eloff, Sebastiaan H. von Solms: Information Security Management: An Approach to Combine Process Certification And Product Evaluation. Computers & Security 19(8): 698-709 (2000)

Coauthor Index

1Ayodele Adesina-Ojo [7]
2A. Barnard [5]
3Jan H. P. Eloff [4] [6] [7] [8] [10] [12] [13] [15]
4Evangelos Frangopoulos [9] [14]
5Paula Kotzé [7]
6Les Labuschagne [8] [10] [12] [13] [15]
7Kate Ormiston [11]
8Laurette Pretorius [5]
9E. Smith [5]
10Rossouw von Solms [13]
11Sebastiaan H. von Solms (Basie von Solms) [1] [2] [3]
12Hein S. Venter (H. S. Venter) [8] [10] [12] [13] [15]
13Lucas M. Venter [5] [9] [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)