dblp.uni-trier.dewww.uni-trier.de

Les Labuschagne

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
22 Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne: Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008 ISSA, Pretoria, South Africa 2008
2007
21 Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa Springer 2007
2006
20 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2006
19EELiesl van Niekerk, Les Labuschagne: The Peculium Model: Information Security Risk Management for the South African SMME. ISSA 2006: 1-14
2005
18 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2005
17EEWerner Bornman, Les Labuschagne: A Framework for Information Security Risk Management Communication. ISSA 2005: 1-11
16EEEduardo Da Cruz, Les Labuschagne: A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective. ISSA 2005: 1-12
15EECarl Marnewick, Les Labuschagne: A security framework for an ERP system. ISSA 2005: 1-15
2004
14 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa ISSA, Pretoria, South Africa 2004
2003
13EEJ. Johnston, Jan H. P. Eloff, Les Labuschagne: Security and human computer interfaces. Computers & Security 22(8): 675-684 (2003)
2001
12 Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon: Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA Kluwer 2001
11 Les Labuschagne: Web Asssurance: Information Security Management for e-commerce. Conference on Information Security Management & Small Systems Security 2001: 1-12
10 Les Labuschagne, Jan H. P. Eloff: E-Commerce Strategy Formulation. I3E 2001: 289-302
2000
9 Les Labuschagne: A Framework for Electronic Commerce Security. SEC 2000: 441-450
8EELes Labuschagne, Jan H. P. Eloff: Electronic commerce: the information-security challenge. Inf. Manag. Comput. Security 8(3): 154-157 (2000)
1999
7 Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren: Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands Kluwer 1999
6 H. S. Venter, Les Labuschagne, Jan H. P. Eloff: Real-time Risk Analysis on the Internet: a prototype. Conference on Information Security Management & Small Systems Security 1999: 11-28
1998
5EELes Labuschagne, Jan H. P. Eloff: The use of real-time risk analysis to enable dynamic activation of countermeasures. Computers & Security 17(4): 347-357 (1998)
4EELes Labuschagne, Jan H. P. Eloff: Real-time risk analysis using Java concepts. Inf. Manag. Comput. Security 6(5): 212-217 (1998)
1997
3EELes Labuschagne, Jan H. P. Eloff: Improved system-access control using complementary technologies. Computers & Security 16(6): 543-549 (1997)
1996
2 Les Labuschagne, Jan H. P. Eloff: Activating dynamic counter measures to reduce risk. SEC 1996: 187-196
1993
1EEJan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst: A comparative framework for risk analysis methods. Computers & Security 12(6): 597-603 (1993)

Coauthor Index

1Karin P. Badenhorst [1]
2Werner Bornman [17]
3Eduardo Da Cruz [16]
4Gurpreet Dhillon [12]
5Jan H. P. Eloff [1] [2] [3] [4] [5] [6] [7] [8] [10] [12] [13] [14] [18] [20] [21] [22]
6Mariki M. Eloff [14] [18] [20] [21] [22]
7J. Johnston [13]
8Carl Marnewick [15]
9Liesl van Niekerk [19]
10Rossouw von Solms [7] [12] [21]
11Hein S. Venter (H. S. Venter) [6] [14] [18] [20] [21] [22]
12Jan Verschuren [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)