2008 | ||
---|---|---|
7 | EE | Matthew Deas, Stephen Flowerday: A User Centric Model for Online Identity and Access Management. ISSA 2008: 1-21 |
6 | EE | Naomi Isabirye, Stephen Flowerday: A model for eliciting user requirements specific to South African rural areas. SAICSIT Conf. 2008: 124-130 |
2007 | ||
5 | EE | Gideon Ranga, Stephen Flowerday: Identity and access management for the distribution of social grants in South Africa. SAICSIT Conf. 2007: 125-131 |
4 | EE | Stephen Flowerday, Gideon Ranga: Identification Now and in the Future: Social Grant Distribution Process in South Africa. SEC 2007: 457-459 |
2006 | ||
3 | EE | Stephen Flowerday, Rossouw von Solms: Trust: An Element of Information Security. SEC 2006: 87-98 |
2 | EE | Stephen Flowerday, A. W. Blundell, Rossouw von Solms: Continuous auditing technologies and models: A discussion. Computers & Security 25(5): 325-331 (2006) |
2005 | ||
1 | EE | Stephen Flowerday, Rossouw von Solms: Real-time information integrity = system integrity + data integrity + continuous assurances. Computers & Security 24(8): 604-613 (2005) |
1 | A. W. Blundell | [2] |
2 | Matthew Deas | [7] |
3 | Naomi Isabirye | [6] |
4 | Gideon Ranga | [4] [5] |
5 | Rossouw von Solms | [1] [2] [3] |