Basie von Solms
List of publications from the DBLP Bibliography Server - FAQ
2007 | ||
---|---|---|
60 | EE | Christian J. Eibl, Basie von Solms, Sigrid E. Schubert: Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. SEC 2007: 181-192 |
2006 | ||
59 | Sebastiaan H. von Solms, C. P. Louwrens, Colette Reekie, Talania Grobler: A Control Framework for Digital Forensics. IFIP Int. Conf. Digital Forensics 2006: 343-355 | |
58 | EE | Colette Reekie, Basie von Solms: A Corporate Capital Protection and Assurance Model. OTM Workshops (1) 2006: 546-553 |
57 | EE | Sebastiaan H. von Solms: Information Security - The Fourth Wave. Computers & Security 25(3): 165-168 (2006) |
56 | EE | Rossouw von Solms, Sebastiaan H. von Solms: Information Security Governance: A model based on the Direct-Control Cycle. Computers & Security 25(6): 408-412 (2006) |
55 | EE | Rossouw von Solms, Sebastiaan H. von Solms: Information security governance: Due care. Computers & Security 25(7): 494-497 (2006) |
2005 | ||
54 | Sebastiaan H. von Solms, M. P. Hertenberger: ERPSEC - A Reference Framework to Enhance Security in ERP Systems. SEC 2005: 79-94 | |
53 | EE | Basie von Solms: Information Security governance: COBIT or ISO 17799 or both? Computers & Security 24(2): 99-104 (2005) |
52 | EE | Basie von Solms, Rossouw von Solms: From information security to ... business security? Computers & Security 24(4): 271-273 (2005) |
51 | EE | Basie von Solms: Information Security Governance - Compliance management vs operational management. Computers & Security 24(6): 443-447 (2005) |
2004 | ||
50 | Sebastiaan H. von Solms, M. P. Hertenberger: A Case For Information Ownership in ERP Systems. SEC 2004: 135-150 | |
49 | EE | Rossouw von Solms, Sebastiaan H. von Solms: From policies to culture. Computers & Security 23(4): 275-279 (2004) |
48 | EE | Sebastiaan H. von Solms, Rossouw von Solms: The 10 deadly sins of information security management. Computers & Security 23(5): 371-376 (2004) |
47 | EE | Sebastiaan H. von Solms, Emil Marais: From secure wired networks to secure wireless networks - what are the extra risks? Computers & Security 23(8): 633-637 (2004) |
2001 | ||
46 | Sebastiaan H. von Solms, M. V. Kisimov: Information Security: Mutual Authentication in E-Commerce. Network Security 2001: 15-32 | |
45 | Basie von Solms: Corporate Governance and Information Security. Computers & Security 20(3): 215-218 (2001) | |
44 | Basie von Solms, Rossouw von Solms: Incremental Information Security Certification. Computers & Security 20(4): 308-310 (2001) | |
43 | Basie von Solms: Information Security - A Multidimensional Discipline. Computers & Security 20(6): 504-508 (2001) | |
2000 | ||
42 | Mariki M. Eloff, Sebastiaan H. von Solms: Information Security: Process Evaluation and Product Evaluation. SEC 2000: 11-18 | |
41 | C. P. Louwrens, Sebastiaan H. von Solms: "DNA-proofing" for Computer Systems - A New Approach to Computer Security? SEC 2000: 121-129 | |
40 | Elmarie von Solms, Sebastiaan H. von Solms: Information Security Management Through Measurement. SEC 2000: 59-68 | |
39 | Mariki M. Eloff, Sebastiaan H. von Solms: Information Security Management: A Hierarchical Framework for Various Approaches. Computers & Security 19(3): 243-256 (2000) | |
38 | Basie von Solms: Information Security - The Third Wave? Computers & Security 19(7): 615-620 (2000) | |
37 | Mariki M. Eloff, Sebastiaan H. von Solms: Information Security Management: An Approach to Combine Process Certification And Product Evaluation. Computers & Security 19(8): 698-709 (2000) | |
1999 | ||
36 | EE | Sebastiaan H. von Solms, J. H. S. Geldenhuys: Managing multi level security in a military intranet environment. Computers & Security 18(3): 257-270 (1999) |
1998 | ||
35 | EE | Sebastiaan H. von Solms, J. H. S. Geldenhuys: Collecting security baggage on the internet. Computers & Security 17(4): 337-345 (1998) |
34 | EE | Sebastiaan H. von Solms: Electronic commerce with secure intelligent trade agents. Computers & Security 17(5): 435-446 (1998) |
1997 | ||
33 | Jacobus E. van der Merwe, Sebastiaan H. von Solms: Electronic commerce with secure intelligent trade agent. ICICS 1997: 452-462 | |
32 | A. van Rensburg, Sebastiaan H. von Solms: A comparison of schemes for certification authorities/trusted third parties. SEC 1997: 222-240 | |
31 | P. W. J. van Zyl, Sebastiaan H. von Solms: Roaming security agents enabling intelligent access control and network protection. SEC 1997: 452-468 | |
30 | C. P. Louwrens, Sebastiaan H. von Solms: Selection of secure single sign-on solutions for heterogeneous computing environments. SEC 1997: 9-24 | |
1996 | ||
29 | Sebastiaan H. von Solms: Information security on the electronic superhighway. SEC 1996: 153-166 | |
28 | Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms: MoFAC: a model for fine-grained access control. SEC 1996: 295-305 | |
1995 | ||
27 | EE | D. N. J. Mostert, Sebastiaan H. von Solms: A technique to include computer security, safety, and resilience requirements as part of the requirements specification. Journal of Systems and Software 31(1): 45-53 (1995) |
1994 | ||
26 | EE | Martin S. Olivier, Sebastiaan H. von Solms: A Taxonomy for Secure Object-Oriented Databases. ACM Trans. Database Syst. 19(1): 3-46 (1994) |
25 | EE | D. N. J. Mostert, Sebastiaan H. von Solms: A methodology to include computer security, safety and resilience requirements as part of the user requirement. Computers & Security 13(4): 349-364 (1994) |
24 | EE | Sebastiaan H. von Solms, Isak van der Merwe: The management of computer security profiles using a role-oriented approach. Computers & Security 13(8): 673-680 (1994) |
1993 | ||
23 | L. M. du Toit, Sebastiaan H. von Solms: A Model for Organising Information Security Documentation. SEC 1993: 227-242 | |
22 | Dalenca Pottas, Sebastiaan H. von Solms: Superseding Manual Generation of Access Control Specification - From Policies to Profiles. SEC 1993: 327-342 | |
21 | Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll: A Process Approach to Information Security Management. SEC 1993: 385-399 | |
20 | EE | Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli: A Model for Information Security Management. Inf. Manag. Comput. Security 1(3): (1993) |
1992 | ||
19 | Dalenca Pottas, Sebastiaan H. von Solms: MAPS - Model for Automated Profile Specification. SEC 1992: 113-126 | |
18 | Martin S. Olivier, Sebastiaan H. von Solms: DISCO - A Discretionary Security Model for Object-oriented Databases. SEC 1992: 345-357 | |
17 | EE | Martin S. Olivier, Sebastiaan H. von Solms: Building a secure database using self-protecting objects. Computers & Security 11(3): 259-271 (1992) |
16 | EE | Sebastiaan H. von Solms, David Naccache: On blind signatures and perfect crimes. Computers & Security 11(6): 581-583 (1992) |
15 | EE | P. G. Mulder, Sebastiaan H. von Solms: The implementation of a protocol using automata. Inf. Sci. 59(1-2): 53-89 (1992) |
1991 | ||
14 | EE | Dalenca Pottas, Sebastiaan H. von Solms: A computerized management reporting aid for a mainframe security system. Computers & Security 10(7): 653-660 (1991) |
13 | EE | E. M. Ehlers, Sebastiaan H. von Solms: Random context structure grammars and automata--a formal approach. Inf. Sci. 53(1-2): 159-183 (1991) |
1989 | ||
12 | EE | W. H. Boshoff, Sebastiaan H. von Solms: A path context model for addressing security in potentially non-secure environments. Computers & Security 8(5): 417-425 (1989) |
11 | E. M. Ehlers, Sebastiaan H. von Solms: Using Random Context Structure Grammars to Represent Chemical Structures. Inf. Process. Lett. 30(3): 159-166 (1989) | |
10 | EE | D. N. J. Mostert, Jan H. P. Eloff, Sebastiaan H. von Solms: A methodology for measuring user satisfaction. Inf. Process. Manage. 25(5): 545-556 (1989) |
1988 | ||
9 | M. H. Rennhackkamp, Sebastiaan H. von Solms: On Using an Abstract Model of Distributed Database Concurrency Control Methods. Comput. J. 31(6): 570-572 (1988) | |
1987 | ||
8 | EE | E. M. Ehlers, Sebastiaan H. von Solms: A hierarchy of random-context grammars and automata. Inf. Sci. 42(1): 1-29 (1987) |
1980 | ||
7 | Sebastiaan H. von Solms: Random Context Array Grammmars. IFIP Congress 1980: 59-64 | |
1978 | ||
6 | EE | Grzegorz Rozenberg, Sebastiaan H. von Solms: Priorities on context conditions in rewriting systems. Inf. Sci. 14(1): 15-50 (1978) |
5 | EE | Grzegorz Rozenberg, Sebastiaan H. von Solms: Rewriting systems with a clocking mechanism. Inf. Sci. 14(3): 221-280 (1978) |
1976 | ||
4 | Grzegorz Rozenberg, Sebastiaan H. von Solms: Some Aspects of Random Context Grammars. GI Jahrestagung 1976: 63-75 | |
1975 | ||
3 | Sebastiaan H. von Solms: On T0L Languages over Terminals. Inf. Process. Lett. 3(3): 69-70 (1975) | |
2 | Sebastiaan H. von Solms: The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area Information and Control 27(3): 262-271 (1975) | |
1973 | ||
1 | Sebastiaan H. von Solms: The characterization of certain classes of languages in the context sensitive area by automata. Automatentheorie und Formale Sprachen 1973: 182-190 |
1 | W. H. Boshoff | [12] |
2 | William J. Caelli | [20] |
3 | John M. Carroll | [21] |
4 | Elizabeth Marie Ehlers (E. M. Ehlers) | [8] [11] [13] |
5 | Christian J. Eibl | [60] |
6 | Jan H. P. Eloff | [10] |
7 | Mariki M. Eloff | [37] [39] [42] |
8 | J. H. S. Geldenhuys | [35] [36] |
9 | Talania Grobler | [59] |
10 | M. P. Hertenberger | [50] [54] |
11 | M. V. Kisimov | [46] |
12 | C. P. Louwrens | [30] [41] [59] |
13 | Emil Marais | [47] |
14 | Isak van der Merwe | [24] |
15 | Jacobus E. van der Merwe | [33] |
16 | D. N. J. Mostert | [10] [25] [27] |
17 | P. G. Mulder | [15] |
18 | David Naccache | [16] |
19 | Martin S. Olivier | [17] [18] [26] [28] |
20 | Dalenca Pottas | [14] [19] [22] |
21 | Colette Reekie | [58] [59] |
22 | M. H. Rennhackkamp | [9] |
23 | A. van Rensburg | [32] |
24 | Grzegorz Rozenberg | [4] [5] [6] |
25 | Sigrid E. Schubert | [60] |
26 | Elmarie von Solms | [40] |
27 | Johan S. von Solms | [28] |
28 | Rossouw von Solms | [20] [21] [44] [48] [49] [52] [55] [56] |
29 | L. M. du Toit | [23] |
30 | P. W. J. van Zyl | [31] |