![]() |
| 2008 | ||
|---|---|---|
| 7 | EE | Matthew Deas, Stephen Flowerday: A User Centric Model for Online Identity and Access Management. ISSA 2008: 1-21 |
| 6 | EE | Naomi Isabirye, Stephen Flowerday: A model for eliciting user requirements specific to South African rural areas. SAICSIT Conf. 2008: 124-130 |
| 2007 | ||
| 5 | EE | Gideon Ranga, Stephen Flowerday: Identity and access management for the distribution of social grants in South Africa. SAICSIT Conf. 2007: 125-131 |
| 4 | EE | Stephen Flowerday, Gideon Ranga: Identification Now and in the Future: Social Grant Distribution Process in South Africa. SEC 2007: 457-459 |
| 2006 | ||
| 3 | EE | Stephen Flowerday, Rossouw von Solms: Trust: An Element of Information Security. SEC 2006: 87-98 |
| 2 | EE | Stephen Flowerday, A. W. Blundell, Rossouw von Solms: Continuous auditing technologies and models: A discussion. Computers & Security 25(5): 325-331 (2006) |
| 2005 | ||
| 1 | EE | Stephen Flowerday, Rossouw von Solms: Real-time information integrity = system integrity + data integrity + continuous assurances. Computers & Security 24(8): 604-613 (2005) |
| 1 | A. W. Blundell | [2] |
| 2 | Matthew Deas | [7] |
| 3 | Naomi Isabirye | [6] |
| 4 | Gideon Ranga | [4] [5] |
| 5 | Rossouw von Solms | [1] [2] [3] |