2007 |
60 | EE | Christian J. Eibl,
Basie von Solms,
Sigrid E. Schubert:
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content.
SEC 2007: 181-192 |
2006 |
59 | | Sebastiaan H. von Solms,
C. P. Louwrens,
Colette Reekie,
Talania Grobler:
A Control Framework for Digital Forensics.
IFIP Int. Conf. Digital Forensics 2006: 343-355 |
58 | EE | Colette Reekie,
Basie von Solms:
A Corporate Capital Protection and Assurance Model.
OTM Workshops (1) 2006: 546-553 |
57 | EE | Sebastiaan H. von Solms:
Information Security - The Fourth Wave.
Computers & Security 25(3): 165-168 (2006) |
56 | EE | Rossouw von Solms,
Sebastiaan H. von Solms:
Information Security Governance: A model based on the Direct-Control Cycle.
Computers & Security 25(6): 408-412 (2006) |
55 | EE | Rossouw von Solms,
Sebastiaan H. von Solms:
Information security governance: Due care.
Computers & Security 25(7): 494-497 (2006) |
2005 |
54 | | Sebastiaan H. von Solms,
M. P. Hertenberger:
ERPSEC - A Reference Framework to Enhance Security in ERP Systems.
SEC 2005: 79-94 |
53 | EE | Basie von Solms:
Information Security governance: COBIT or ISO 17799 or both?
Computers & Security 24(2): 99-104 (2005) |
52 | EE | Basie von Solms,
Rossouw von Solms:
From information security to ... business security?
Computers & Security 24(4): 271-273 (2005) |
51 | EE | Basie von Solms:
Information Security Governance - Compliance management vs operational management.
Computers & Security 24(6): 443-447 (2005) |
2004 |
50 | | Sebastiaan H. von Solms,
M. P. Hertenberger:
A Case For Information Ownership in ERP Systems.
SEC 2004: 135-150 |
49 | EE | Rossouw von Solms,
Sebastiaan H. von Solms:
From policies to culture.
Computers & Security 23(4): 275-279 (2004) |
48 | EE | Sebastiaan H. von Solms,
Rossouw von Solms:
The 10 deadly sins of information security management.
Computers & Security 23(5): 371-376 (2004) |
47 | EE | Sebastiaan H. von Solms,
Emil Marais:
From secure wired networks to secure wireless networks - what are the extra risks?
Computers & Security 23(8): 633-637 (2004) |
2001 |
46 | | Sebastiaan H. von Solms,
M. V. Kisimov:
Information Security: Mutual Authentication in E-Commerce.
Network Security 2001: 15-32 |
45 | | Basie von Solms:
Corporate Governance and Information Security.
Computers & Security 20(3): 215-218 (2001) |
44 | | Basie von Solms,
Rossouw von Solms:
Incremental Information Security Certification.
Computers & Security 20(4): 308-310 (2001) |
43 | | Basie von Solms:
Information Security - A Multidimensional Discipline.
Computers & Security 20(6): 504-508 (2001) |
2000 |
42 | | Mariki M. Eloff,
Sebastiaan H. von Solms:
Information Security: Process Evaluation and Product Evaluation.
SEC 2000: 11-18 |
41 | | C. P. Louwrens,
Sebastiaan H. von Solms:
"DNA-proofing" for Computer Systems - A New Approach to Computer Security?
SEC 2000: 121-129 |
40 | | Elmarie von Solms,
Sebastiaan H. von Solms:
Information Security Management Through Measurement.
SEC 2000: 59-68 |
39 | | Mariki M. Eloff,
Sebastiaan H. von Solms:
Information Security Management: A Hierarchical Framework for Various Approaches.
Computers & Security 19(3): 243-256 (2000) |
38 | | Basie von Solms:
Information Security - The Third Wave?
Computers & Security 19(7): 615-620 (2000) |
37 | | Mariki M. Eloff,
Sebastiaan H. von Solms:
Information Security Management: An Approach to Combine Process Certification And Product Evaluation.
Computers & Security 19(8): 698-709 (2000) |
1999 |
36 | EE | Sebastiaan H. von Solms,
J. H. S. Geldenhuys:
Managing multi level security in a military intranet environment.
Computers & Security 18(3): 257-270 (1999) |
1998 |
35 | EE | Sebastiaan H. von Solms,
J. H. S. Geldenhuys:
Collecting security baggage on the internet.
Computers & Security 17(4): 337-345 (1998) |
34 | EE | Sebastiaan H. von Solms:
Electronic commerce with secure intelligent trade agents.
Computers & Security 17(5): 435-446 (1998) |
1997 |
33 | | Jacobus E. van der Merwe,
Sebastiaan H. von Solms:
Electronic commerce with secure intelligent trade agent.
ICICS 1997: 452-462 |
32 | | A. van Rensburg,
Sebastiaan H. von Solms:
A comparison of schemes for certification authorities/trusted third parties.
SEC 1997: 222-240 |
31 | | P. W. J. van Zyl,
Sebastiaan H. von Solms:
Roaming security agents enabling intelligent access control and network protection.
SEC 1997: 452-468 |
30 | | C. P. Louwrens,
Sebastiaan H. von Solms:
Selection of secure single sign-on solutions for heterogeneous computing environments.
SEC 1997: 9-24 |
1996 |
29 | | Sebastiaan H. von Solms:
Information security on the electronic superhighway.
SEC 1996: 153-166 |
28 | | Johan S. von Solms,
Martin S. Olivier,
Sebastiaan H. von Solms:
MoFAC: a model for fine-grained access control.
SEC 1996: 295-305 |
1995 |
27 | EE | D. N. J. Mostert,
Sebastiaan H. von Solms:
A technique to include computer security, safety, and resilience requirements as part of the requirements specification.
Journal of Systems and Software 31(1): 45-53 (1995) |
1994 |
26 | EE | Martin S. Olivier,
Sebastiaan H. von Solms:
A Taxonomy for Secure Object-Oriented Databases.
ACM Trans. Database Syst. 19(1): 3-46 (1994) |
25 | EE | D. N. J. Mostert,
Sebastiaan H. von Solms:
A methodology to include computer security, safety and resilience requirements as part of the user requirement.
Computers & Security 13(4): 349-364 (1994) |
24 | EE | Sebastiaan H. von Solms,
Isak van der Merwe:
The management of computer security profiles using a role-oriented approach.
Computers & Security 13(8): 673-680 (1994) |
1993 |
23 | | L. M. du Toit,
Sebastiaan H. von Solms:
A Model for Organising Information Security Documentation.
SEC 1993: 227-242 |
22 | | Dalenca Pottas,
Sebastiaan H. von Solms:
Superseding Manual Generation of Access Control Specification - From Policies to Profiles.
SEC 1993: 327-342 |
21 | | Rossouw von Solms,
Sebastiaan H. von Solms,
John M. Carroll:
A Process Approach to Information Security Management.
SEC 1993: 385-399 |
20 | EE | Rossouw von Solms,
Sebastiaan H. von Solms,
William J. Caelli:
A Model for Information Security Management.
Inf. Manag. Comput. Security 1(3): (1993) |
1992 |
19 | | Dalenca Pottas,
Sebastiaan H. von Solms:
MAPS - Model for Automated Profile Specification.
SEC 1992: 113-126 |
18 | | Martin S. Olivier,
Sebastiaan H. von Solms:
DISCO - A Discretionary Security Model for Object-oriented Databases.
SEC 1992: 345-357 |
17 | EE | Martin S. Olivier,
Sebastiaan H. von Solms:
Building a secure database using self-protecting objects.
Computers & Security 11(3): 259-271 (1992) |
16 | EE | Sebastiaan H. von Solms,
David Naccache:
On blind signatures and perfect crimes.
Computers & Security 11(6): 581-583 (1992) |
15 | EE | P. G. Mulder,
Sebastiaan H. von Solms:
The implementation of a protocol using automata.
Inf. Sci. 59(1-2): 53-89 (1992) |
1991 |
14 | EE | Dalenca Pottas,
Sebastiaan H. von Solms:
A computerized management reporting aid for a mainframe security system.
Computers & Security 10(7): 653-660 (1991) |
13 | EE | E. M. Ehlers,
Sebastiaan H. von Solms:
Random context structure grammars and automata--a formal approach.
Inf. Sci. 53(1-2): 159-183 (1991) |
1989 |
12 | EE | W. H. Boshoff,
Sebastiaan H. von Solms:
A path context model for addressing security in potentially non-secure environments.
Computers & Security 8(5): 417-425 (1989) |
11 | | E. M. Ehlers,
Sebastiaan H. von Solms:
Using Random Context Structure Grammars to Represent Chemical Structures.
Inf. Process. Lett. 30(3): 159-166 (1989) |
10 | EE | D. N. J. Mostert,
Jan H. P. Eloff,
Sebastiaan H. von Solms:
A methodology for measuring user satisfaction.
Inf. Process. Manage. 25(5): 545-556 (1989) |
1988 |
9 | | M. H. Rennhackkamp,
Sebastiaan H. von Solms:
On Using an Abstract Model of Distributed Database Concurrency Control Methods.
Comput. J. 31(6): 570-572 (1988) |
1987 |
8 | EE | E. M. Ehlers,
Sebastiaan H. von Solms:
A hierarchy of random-context grammars and automata.
Inf. Sci. 42(1): 1-29 (1987) |
1980 |
7 | | Sebastiaan H. von Solms:
Random Context Array Grammmars.
IFIP Congress 1980: 59-64 |
1978 |
6 | EE | Grzegorz Rozenberg,
Sebastiaan H. von Solms:
Priorities on context conditions in rewriting systems.
Inf. Sci. 14(1): 15-50 (1978) |
5 | EE | Grzegorz Rozenberg,
Sebastiaan H. von Solms:
Rewriting systems with a clocking mechanism.
Inf. Sci. 14(3): 221-280 (1978) |
1976 |
4 | | Grzegorz Rozenberg,
Sebastiaan H. von Solms:
Some Aspects of Random Context Grammars.
GI Jahrestagung 1976: 63-75 |
1975 |
3 | | Sebastiaan H. von Solms:
On T0L Languages over Terminals.
Inf. Process. Lett. 3(3): 69-70 (1975) |
2 | | Sebastiaan H. von Solms:
The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area
Information and Control 27(3): 262-271 (1975) |
1973 |
1 | | Sebastiaan H. von Solms:
The characterization of certain classes of languages in the context sensitive area by automata.
Automatentheorie und Formale Sprachen 1973: 182-190 |