dblp.uni-trier.dewww.uni-trier.de

Sebastiaan H. von Solms

Basie von Solms

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2007
60EEChristian J. Eibl, Basie von Solms, Sigrid E. Schubert: Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. SEC 2007: 181-192
2006
59 Sebastiaan H. von Solms, C. P. Louwrens, Colette Reekie, Talania Grobler: A Control Framework for Digital Forensics. IFIP Int. Conf. Digital Forensics 2006: 343-355
58EEColette Reekie, Basie von Solms: A Corporate Capital Protection and Assurance Model. OTM Workshops (1) 2006: 546-553
57EESebastiaan H. von Solms: Information Security - The Fourth Wave. Computers & Security 25(3): 165-168 (2006)
56EERossouw von Solms, Sebastiaan H. von Solms: Information Security Governance: A model based on the Direct-Control Cycle. Computers & Security 25(6): 408-412 (2006)
55EERossouw von Solms, Sebastiaan H. von Solms: Information security governance: Due care. Computers & Security 25(7): 494-497 (2006)
2005
54 Sebastiaan H. von Solms, M. P. Hertenberger: ERPSEC - A Reference Framework to Enhance Security in ERP Systems. SEC 2005: 79-94
53EEBasie von Solms: Information Security governance: COBIT or ISO 17799 or both? Computers & Security 24(2): 99-104 (2005)
52EEBasie von Solms, Rossouw von Solms: From information security to ... business security? Computers & Security 24(4): 271-273 (2005)
51EEBasie von Solms: Information Security Governance - Compliance management vs operational management. Computers & Security 24(6): 443-447 (2005)
2004
50 Sebastiaan H. von Solms, M. P. Hertenberger: A Case For Information Ownership in ERP Systems. SEC 2004: 135-150
49EERossouw von Solms, Sebastiaan H. von Solms: From policies to culture. Computers & Security 23(4): 275-279 (2004)
48EESebastiaan H. von Solms, Rossouw von Solms: The 10 deadly sins of information security management. Computers & Security 23(5): 371-376 (2004)
47EESebastiaan H. von Solms, Emil Marais: From secure wired networks to secure wireless networks - what are the extra risks? Computers & Security 23(8): 633-637 (2004)
2001
46 Sebastiaan H. von Solms, M. V. Kisimov: Information Security: Mutual Authentication in E-Commerce. Network Security 2001: 15-32
45 Basie von Solms: Corporate Governance and Information Security. Computers & Security 20(3): 215-218 (2001)
44 Basie von Solms, Rossouw von Solms: Incremental Information Security Certification. Computers & Security 20(4): 308-310 (2001)
43 Basie von Solms: Information Security - A Multidimensional Discipline. Computers & Security 20(6): 504-508 (2001)
2000
42 Mariki M. Eloff, Sebastiaan H. von Solms: Information Security: Process Evaluation and Product Evaluation. SEC 2000: 11-18
41 C. P. Louwrens, Sebastiaan H. von Solms: "DNA-proofing" for Computer Systems - A New Approach to Computer Security? SEC 2000: 121-129
40 Elmarie von Solms, Sebastiaan H. von Solms: Information Security Management Through Measurement. SEC 2000: 59-68
39 Mariki M. Eloff, Sebastiaan H. von Solms: Information Security Management: A Hierarchical Framework for Various Approaches. Computers & Security 19(3): 243-256 (2000)
38 Basie von Solms: Information Security - The Third Wave? Computers & Security 19(7): 615-620 (2000)
37 Mariki M. Eloff, Sebastiaan H. von Solms: Information Security Management: An Approach to Combine Process Certification And Product Evaluation. Computers & Security 19(8): 698-709 (2000)
1999
36EESebastiaan H. von Solms, J. H. S. Geldenhuys: Managing multi level security in a military intranet environment. Computers & Security 18(3): 257-270 (1999)
1998
35EESebastiaan H. von Solms, J. H. S. Geldenhuys: Collecting security baggage on the internet. Computers & Security 17(4): 337-345 (1998)
34EESebastiaan H. von Solms: Electronic commerce with secure intelligent trade agents. Computers & Security 17(5): 435-446 (1998)
1997
33 Jacobus E. van der Merwe, Sebastiaan H. von Solms: Electronic commerce with secure intelligent trade agent. ICICS 1997: 452-462
32 A. van Rensburg, Sebastiaan H. von Solms: A comparison of schemes for certification authorities/trusted third parties. SEC 1997: 222-240
31 P. W. J. van Zyl, Sebastiaan H. von Solms: Roaming security agents enabling intelligent access control and network protection. SEC 1997: 452-468
30 C. P. Louwrens, Sebastiaan H. von Solms: Selection of secure single sign-on solutions for heterogeneous computing environments. SEC 1997: 9-24
1996
29 Sebastiaan H. von Solms: Information security on the electronic superhighway. SEC 1996: 153-166
28 Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms: MoFAC: a model for fine-grained access control. SEC 1996: 295-305
1995
27EED. N. J. Mostert, Sebastiaan H. von Solms: A technique to include computer security, safety, and resilience requirements as part of the requirements specification. Journal of Systems and Software 31(1): 45-53 (1995)
1994
26EEMartin S. Olivier, Sebastiaan H. von Solms: A Taxonomy for Secure Object-Oriented Databases. ACM Trans. Database Syst. 19(1): 3-46 (1994)
25EED. N. J. Mostert, Sebastiaan H. von Solms: A methodology to include computer security, safety and resilience requirements as part of the user requirement. Computers & Security 13(4): 349-364 (1994)
24EESebastiaan H. von Solms, Isak van der Merwe: The management of computer security profiles using a role-oriented approach. Computers & Security 13(8): 673-680 (1994)
1993
23 L. M. du Toit, Sebastiaan H. von Solms: A Model for Organising Information Security Documentation. SEC 1993: 227-242
22 Dalenca Pottas, Sebastiaan H. von Solms: Superseding Manual Generation of Access Control Specification - From Policies to Profiles. SEC 1993: 327-342
21 Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll: A Process Approach to Information Security Management. SEC 1993: 385-399
20EERossouw von Solms, Sebastiaan H. von Solms, William J. Caelli: A Model for Information Security Management. Inf. Manag. Comput. Security 1(3): (1993)
1992
19 Dalenca Pottas, Sebastiaan H. von Solms: MAPS - Model for Automated Profile Specification. SEC 1992: 113-126
18 Martin S. Olivier, Sebastiaan H. von Solms: DISCO - A Discretionary Security Model for Object-oriented Databases. SEC 1992: 345-357
17EEMartin S. Olivier, Sebastiaan H. von Solms: Building a secure database using self-protecting objects. Computers & Security 11(3): 259-271 (1992)
16EESebastiaan H. von Solms, David Naccache: On blind signatures and perfect crimes. Computers & Security 11(6): 581-583 (1992)
15EEP. G. Mulder, Sebastiaan H. von Solms: The implementation of a protocol using automata. Inf. Sci. 59(1-2): 53-89 (1992)
1991
14EEDalenca Pottas, Sebastiaan H. von Solms: A computerized management reporting aid for a mainframe security system. Computers & Security 10(7): 653-660 (1991)
13EEE. M. Ehlers, Sebastiaan H. von Solms: Random context structure grammars and automata--a formal approach. Inf. Sci. 53(1-2): 159-183 (1991)
1989
12EEW. H. Boshoff, Sebastiaan H. von Solms: A path context model for addressing security in potentially non-secure environments. Computers & Security 8(5): 417-425 (1989)
11 E. M. Ehlers, Sebastiaan H. von Solms: Using Random Context Structure Grammars to Represent Chemical Structures. Inf. Process. Lett. 30(3): 159-166 (1989)
10EED. N. J. Mostert, Jan H. P. Eloff, Sebastiaan H. von Solms: A methodology for measuring user satisfaction. Inf. Process. Manage. 25(5): 545-556 (1989)
1988
9 M. H. Rennhackkamp, Sebastiaan H. von Solms: On Using an Abstract Model of Distributed Database Concurrency Control Methods. Comput. J. 31(6): 570-572 (1988)
1987
8EEE. M. Ehlers, Sebastiaan H. von Solms: A hierarchy of random-context grammars and automata. Inf. Sci. 42(1): 1-29 (1987)
1980
7 Sebastiaan H. von Solms: Random Context Array Grammmars. IFIP Congress 1980: 59-64
1978
6EEGrzegorz Rozenberg, Sebastiaan H. von Solms: Priorities on context conditions in rewriting systems. Inf. Sci. 14(1): 15-50 (1978)
5EEGrzegorz Rozenberg, Sebastiaan H. von Solms: Rewriting systems with a clocking mechanism. Inf. Sci. 14(3): 221-280 (1978)
1976
4 Grzegorz Rozenberg, Sebastiaan H. von Solms: Some Aspects of Random Context Grammars. GI Jahrestagung 1976: 63-75
1975
3 Sebastiaan H. von Solms: On T0L Languages over Terminals. Inf. Process. Lett. 3(3): 69-70 (1975)
2 Sebastiaan H. von Solms: The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area Information and Control 27(3): 262-271 (1975)
1973
1 Sebastiaan H. von Solms: The characterization of certain classes of languages in the context sensitive area by automata. Automatentheorie und Formale Sprachen 1973: 182-190

Coauthor Index

1W. H. Boshoff [12]
2William J. Caelli [20]
3John M. Carroll [21]
4Elizabeth Marie Ehlers (E. M. Ehlers) [8] [11] [13]
5Christian J. Eibl [60]
6Jan H. P. Eloff [10]
7Mariki M. Eloff [37] [39] [42]
8J. H. S. Geldenhuys [35] [36]
9Talania Grobler [59]
10M. P. Hertenberger [50] [54]
11M. V. Kisimov [46]
12C. P. Louwrens [30] [41] [59]
13Emil Marais [47]
14Isak van der Merwe [24]
15Jacobus E. van der Merwe [33]
16D. N. J. Mostert [10] [25] [27]
17P. G. Mulder [15]
18David Naccache [16]
19Martin S. Olivier [17] [18] [26] [28]
20Dalenca Pottas [14] [19] [22]
21Colette Reekie [58] [59]
22M. H. Rennhackkamp [9]
23A. van Rensburg [32]
24Grzegorz Rozenberg [4] [5] [6]
25Sigrid E. Schubert [60]
26Elmarie von Solms [40]
27Johan S. von Solms [28]
28Rossouw von Solms [20] [21] [44] [48] [49] [52] [55] [56]
29L. M. du Toit [23]
30P. W. J. van Zyl [31]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)