International Conference Papers

wispsyndicateΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 5 μήνες)

119 εμφανίσεις

International Conference Papers



2008


Crossingham, C, von Solms, SH, ‘BASE: A Proposed Secure Biometric Authentication System’,
Proceedings of the 1st IFIP WG 6.1 Conference on Policies and Research in Identity Management,
Springer, 2008

Andrade, C, von Sol
ms, SH, ‘Investigating and Comparing Multimodal Biometric Techniques’, Proceedings
of the 1st IFIP WG 6.1 Conference on Policies and Research in Identity Management, Springer, 2008

Tait, B, von Solms, SH, ‘Secure Biometrically Based Authentication Protoco
l for a Public Network
Environment’, Proceedings of the 4th International Conference Global e
-
Security, Communications in
Computer and Information Science, 12, 2008, Springer, 2008

Lessing, M, von Solms SH, ‘Live Forensic Acquisition as alternative to tra
ditional Forensic Processes,
Proceedings of the 4th International Conference on IT Incident Management & IT Forensics, Gesellschaft fur
Informatik, Bonn, 2008

Lessing, M, von Solms SH, ‘Building a World Class Information Security Governance Model’, Procee
dings of
IST
-
Africa 2008 Conference, Published in: IST
-
Africa 2008 Conference Proceedings, Paul Cunningham and
Miriam Cunningham (Eds), IIMC International Information Management Corporation, 2008, ISBN: 978
-
1
-
905824
-
07
-
6

von Solms, SH, ‘Critical Informatio
n Infrastructure Protection


Essential during War times, Peace Times or
both?’, Proceedings of the International IFIP TC 9 Conference on ICT uses in Warfare and the safeguarding
of Peace, Published by the CSIR, Pretoria

2007


Christian Josef Eibl, Sigrid Schubert

(
University of Siegen, Germany),
Basie von Solms

University of Johannesburg


Development and Application of

a Proxy Server for Transparently, Digitally Signing E
-
Learning Content
s

[[Link to URL http://www.sbs.co.za/ifipsec2007/_programme/_ABSTRACTS/ifipsec2007_ABSTRACT
-
10.htm#Anchor
-
Development
-
17304]], 22nd IFIP TC 11 International Information Security Confere
nce,
Johannesburg, South Africa, 14 to 16 May 2007. Published in the Proceedings of the Conference, Springer,
2007


2006

SH von Solms, ‘A Framework for an Effective Information Security


Governance


Strategy’,


IFIP World
Computer Confence 2006 (Invited Paper), 25 August 2006, Santiago, Chile

SH von Solms, ‘ICT Risk Governance in a University Environment’, CITTE Confer
ence, 19
-
20 September
2006, Pretoria

SH von Solms, ‘What every Vice
-
Chancellor and Council Members should know about the use of ICT’,
CITTE Conference, 19
-
20 September 2006, Pretoria

SH von Solms, IT Governance in Local Authorities, LOGICT Konferensie , 19

Mei 2006, Hermanus

SH von Solms, ‘Executing a result
-
driven Information Security Governance Framework


Strategy’, IT Africa
Congress 2006 (Invited Paper), 14
-
15 Nov 2006, Midrand, Johannesburg

SH von Solms, ‘A Framework for IT Governance


A Case study a
t the EDEN District’, LOGICT 2006
(Invited Paper),


6
-
7 November 2006, Wildernis

SH von Solms, C Louwrens, C Reekie, T Grobler, ‘A Control Framework for Digital Forensics’, IFIP
International Conference on Digital Forensics, Orlando, Florida, USA, 29 Jan
uary


1 February 2006,
Published in the Conference Proceedings (Advances in Digital Forensics II) by Springer , pp 343


355
(Fully peer reviewed by formal Program Committee)


von Solms, SH, Kritzinger, E, Information Security Governance within the e
-
Le
arning Environment, TLC
Conference 2006, Cancun, Mexico, March 20
-
24, 2006

Published in the Electronic Proceedings of the Conference


Von Solms, SH, Kritzinger, E
-
learning


Incorporating Information Securiy Governance, InSite Conference
2006, Manchester,

UK, 25
-
28 June 2006, Published in the Electronic Proceedings of the Conference


E Marais, Argyles, D, von Solms, SH, ‘Identifying and Protecting eLearning Systems from corrupt use and
plagiarism’, 3
rd

International Conference on for the Knowledge
-
based
Society, Bangkok, Thailand, 3
-
4
August 2006, Published in the Proceedings



E Marais, Argyles, D, von Solms, SH (L), ‘Security issues specific to E
-
assessments’, 8
th

Annual Conference
on WWW Applications, Bloemfontein, 6
-
8 September, 2006 , Published in t
he electronic Conference
Proceedings.


von Solms SH (L), ‘ICT Risk Governance in a University Environment’, CITTE Conference, 19
-
20
September, Pretoria, Published in the electronic Conference Proceedings


von Solms SH, ‘What every Vice
-
Chancellor and Cou
ncil Members should know about the use of ICT’,
CITTE Konferensie, 18
-
20 September 2006, Pretoria, Published in the electronic Conference Proceedings


CJ Eibl, SH von Solms, S Schubert, ‘A Framework for Evaluating the Information Security of E
-
Learning
S
ystems’, 2
nd

International Conference on Information in Secondary Schools : Evolution and Perspectives
(ISSEP 2006), Vilnius, Lithuania, 7
-
11 November 2006, Published in the Conference Proceedings


Reekie C, von Solms SH, ‘A Corporate Protection and Assura
nce Model‘,International Workshop on
Information Security, 29 Oct


3 November 2006, Montpellier, France, Published in Lecture Notes in
Computer Science (LNCS), Vol 4277, November 2006, Springer



2005


Smith E, Kritzinger E, Oosthuizen HJ, von Solms SH, 2005

‘Information Security Education


Bridging the Gap between Academic Institutions and Industry’

Proceedings of th
e IFIP TC 11 WG 11.8 4th World Conference on Information Security Education 2005, 18


20 May 2005, Moscow, Rusland, pp 45


51


von Solms, SH, Tait B, 2005

‘BioVault : Solving the problem of replay in Biometrics’

Proceedings of the 5th Conference on e
-
Co
mmerce, e
-
Business and e
-
Government

28
-
30 Oktober 2005, Poznan, Pole


von Solms, SH, Hertenberger, M, 2005

‘ERPSEC


A Reference Framework to Enhance Security in ERP Systems’

Proceedings of the IFIP TC 11 20th International Security Conference

30 May


1 J
une 2005, Chiba, Japan, pp 79


89


von Solms, SH, 2005

‘Information Security Governance in ICT Based Educational Systems’

Proceedings of the 4th International Conference on ICT and Higher Education

28
-
30 September 2005, Bangkok, Thailand, pp 109


119


Ja
niszyn, Darek, von Solms, SH, 2005

“A more secure e
-
commerce environment based on a self
-
contained biometric USB memory stick”

Electronic Proceedings of Information Security South Africa (ISSA) 2005

29 June


1 July 2005, Johannesburg, South Africa, pp 1


10


du Preez, J, von Solms, SH, 2005

“Personal Identification and Authentication by using “The way the heart beats””

Electronic Proceedings of Information Security South Africa (ISSA) 2005

29 June


1 July 2005, Johannesburg, South Africa, pp 1
-

12

2004



SH von Solms , MP Hertenberger ,

‘A case for information ownership in ERP systems’,

18th IFIP World Computer Confe
rence,

Toulouse, France, Augustus 2004


SH von Solms, E Kritzinger

‘Five non
-
technical pillars of network information security management’,

8th IFIP TC6/TC11 Conference on Communications and Multimedia Security,

Windermere, England, September 2004


SH vo
n Solms , E Kritzinger.

‘The NOKIS Model
-

A Model for Non
-
Technical Aspects of Information Security’,

The 10th International Conference on Information Systems Analysis and Synthesis: ISAS 2004 and
International Conference on Cybernetics and Information Te
chnologies,

Systems and Applications: CITSA 2004, Orlando, USA, July 2004


SH von Solms, R von Solms,

‘Integrating information security into the undergraduate Syllabus’,

Microsoft Academic Days in Dubai,

Dubai, April 2004

2003



Pretorius, E, Von Solms, SH

‘Information Security Governance using ISO 17799 and CobiT’,

Proceedings of IICIS 2003, The 6th IFIP TC 11.5 Worki
ng Conference on Integrity and Internal Control in
Information Systems

November 2003, Lausanne, Switserland, published by Kluwer Academic Press


2000



Geldenhuys, JHS, & Von Solms, SH

"MOSAIC: A Model for Secure Anonymous Internet Communication"

International Academic Publishers Proceedings of the 16th IFIP TC 11 Conference on Information Security,
pp 217
-
223, Beijing,

China, Aug 22
-
24, 2000.


Tait, BL, & Von Solms, SH

"Biometric Single Sign
-
on: Ah Authenticating Server Approach"

International Academic Publishers Proceedings of the 16th IFIP TC 11 Conference on Information Security,
pp 1
-
4, Beijing, China, Aug 22
-
24, 20
00.


Rossudowska, A

"The Enterprise
-
Wide Electronic Business (EWEB) Model
-
An Electronic Business (EB) Solution"

Proceedings of the 16th Word Computer Conference, Beijing, China, Aug 22
-
24, CD
-
ROM, ISBN 7
-
900049
-
66
-
5/TP.66, 2000.


Louwrens, CP, & Von Solms,

SH

"DNA
-
proofing for Computer Systems
-
A New Approach to Computer Security?"

Kluver Acodemic Publishers Proceedings of the 16th IFIP TC 11 Conference on Information Security, pp
121
-
130, Beijing, China, Aug 22
-
24, 2000.


Von Solms, E, & Von Solms, SH

"Info
rmation Security Management Through Measurement"

Kluver Academic Publishers Proceedings of the 16th IFIP TC 11Conference on Information Security, pp 59
-
68, Beijing, China, Aug 22
-
24, 2000.


Eloff, MM, & Von Solms, SH

"Information Security: Process Evaluati
on nad Product Evaluation"

Kluver Academic Publishers Proceedings ofthe 16th IFIP TC 11 Conference on Information Security, pp 11
-
18, Beijing, China, Aug 22
-
24, 2000.


1998



Louwrens, CP, & Von Somls, SH

"Can Computerised Immunity be Achieved, Based on a Biological Model?"

Proceedings of the 14th International Conference on Information Security, Wene/Budapest, pp 240
-
2
50,
Aug/Sept 1998.


Von Solms S.H., CP Louwrens [D]

"Can computerized immunity be achieved based on a biological model?"

Proceeding of IFIP/Sec98, Budapest, Hongaraye, 1998


Von Solms, S.H.

"Information Security and Electronic Commerce"

Proceedings of IFIP
/Sec98, Budapest, Hongarye, 1998


Von Solms S.H.

"Information Security and Electronic Commerce"

Lisbon, Portugal, 1998.


1997



Van Zyl, PWJ, & Von Solms, SH

"Roaming Security Agents Enabling Intelligent Access Control and Network Protection"

Proceedings of the 13th International Conference on Information Security, Copenhagen, pp 452
-
468, 1997.


Van Rensburg, A, & Von S
olms, SH

"A Comparison of Schemes for Certification Authorities/Trusted Third Parties"

Proceedings of the 13th International Conference on Information Security, Copenhagen, pp 222
-
240, 1997.


Louwrens, CP, & Von Solms, HS

"Selection of Secure Sign
-
on Solut
ions for Heterogeneous Computing Environments" Proceedings of the
13th International Conference on Information Security, Copenhegen, pp 9
-
24, 1997.


1996



Von Solms, SH

"Information Security on the Superhighway"

Proceedings of IFIP/Sec '96, Samos, Greece, Chapman & Hall, pp 153
-
166, 1996.


Olivier, MS, Von Solms, J & Von Solms, SH

"MoFAC
-
A Model for Fine
-
Grained Access

Control"

Proceedings of IFIP/Sec '96, Samos, Greece, Chapman & Hall, pp 295
-
305, 1996.


Von Solms, S.H.

"Information security in Medical Informatics."

Proceedings of HELINA 1996, the 2nd International Working Conference on Health Informatics in South
Afr
ica.


Von Solms, S.H.

"Use of the Internet and WWW in Medical Informatics."

Proceedings of HELINA 1996, the 2nd International Working Conference on Health Informatics in South
Africa.


Von Solms, S.H., Olivier, MS., Von Solms, J. (Magister student)

"MoFAC



A Madel for fine
-
Grained Access Control."

Proceedings of IFIP/Sec 1996, Samos Greece, Chapman & Hall.


1995



Von

Solms, S.H., Pottas, D. (Ph.D. student).

"Aligning Information Security Profiles with Organisational Policies."

Proceedings of IFIP/Sec 95. Cape Town, South Africa, 1995.


Von Solms, S.H., Von Solms, R., Calitc, M. (Magisterstudent)

" Information Security

Management in a Distributed Open Enviroment."

Proceedings of IFIP/Sec 95. Cape Town, South Africa, 1995.


Von Solms, S.H., Naccache, D.

"On Blind Signatures and Perfect Crimes."

In Buildings in Big Brother


The Cryptography Policy Debate. Edited by Lan
ce Hoffman. Springer
-
verslag,
1995.


Von Solms, S.H.

"Security on the World Wide Web."

Proceedings of Security on the Internet Seminar. London, England, 1995.


1994



Von Solms, S.H., Van Zyl, P.W. (Ph.D.student), Olivier M.S.

"Moss 2: A Model for Open System Security"

Accepted for Presentation at IFIP/Sec'94, Curacao, May 1994.

(Published in the official proceedings)


1993



Von Solms, S.H., Pottas, D. (Ph.D.student)

"Superseding Manual Generation of Access Control Specification: F
rom Policies to Profiles"

IFIP/Sec'93, The 9th International Conference on Information Security, Toronto, Canada, May 1993.

(Published in the official proceedings)


Von Solms, S.H., Du Toit, L. (M
-
student)

"A Model for Information Security Documentation"

I
FIP/Sec'93, The 9th International Conference on Information Security, Toronto, Canada, May 1993.

(Published in the official proceedings)


Von Solms, S.H., Von Solms, R. (Ph.D.student) & Carroll, J.

"A Process
-
oriented Approach to Information Security Manag
ement"

IFIP/Sec'93, The 9th International Conference on Information Security, Toronto, Canada, May 1993.

(Published in the official proceedings)


Von Solms, S.H. & Pottas, D. (Ph.D.student)

"The Automatic Generation of Information Security Profiles."

Accep
ted for presentation at COMPSEC '93, The 10th World Conference on Computer Security, Audit &
Control, October 1993, London, U.K.

(Published in the official proceedings)


Von Solms, S.H. & Mostert D. (Ph.D.student)

"Integrating Computer Security, Safety and

Resilience into User Requirements."

Accepted for presentation at COMPSEC'93, The 10th World Conference on Computer Security, Audit &
Control, October 1993, London, U.K.

(Published in the official proceedings)


Von Solms, S.H. and Mostert, D. (Ph.D.student
)

"A Methdology to include Security, Safety and Resilience into User Requirements."

CSESAW Conference, Washington, U.S.A., July, 1993.


1992



Von Solms, S.H., Olivier, M.S. (Ph.D.student)

"DISCO
-

A Discretionary Security Model for Object
-
Oriented Databases"

8th International Conference on Information Security (IFIP/SEC '92) Singapore, 1992.

(Published in the official
proceedings of the conference, pp 375
-

388).


Von Solms, S.H., Pottas, D. (Ph.D.student)

"MAPS
-

A Model for Automated Profile Specification"

8th International Conference on Information Security (IFIPSEC'92), Singapore, 1992.

(Published in the official pr
oceedings of conference, pp 131
-

146)


Von Solms, S.H., Von Solms, R. (Ph.D.student), Caelli, W.J.

"A Model for Information Security Management"

TC 11.1 Workshop in INFOSEC, Singapore, 1992.

(Publishes in Notes on Information Security Management, to appea
r)


Von Solms, S.H., Van Zyl, P.W.J. (Ph.D.student)

"MOSS
-

A Model for Open Systems Security"

UNIFORUM ASIA 1992 International Conference, Singapore, August 1992

(Published in the official proceedings of the conference).


1991



Von Solms, S.H., Boshoff, W. (Ph.D.student)

"A New Formal Model for Controlling Security in Multi
-
Domained Computer Environments"

7th Internat
ional Conference on Information Security (IFIP/SEC'90), Brighton, England, 1991.

(Published in the official proceedings of the conference).


Von Solms, S.H.

"Information Security
-

A Management Perspective."

LESTA'91, International Conference on IT, Maseru
, Lesotho, April 1991.


1988



Von Solms, S.H., De Villiers, D.P. (M
-
student)

"A Context
-
Sensitive Security Model"

S
ECURICOM'88: 6th World
-
Wide Conference on Computer Security, Paris, France, 1988.

(Published in the official proceedings of the conference).