DAY 1 - Wednesday, 30 June 2004 |
09:00-13:00 |
Invited Speaker
Presentations |
13:00-14:00 |
Lunch |
|
Stream 1: Information Security
Management |
Stream 2:
Vulnerability Detection |
Stream 3:
Web Security |
14:00-14:30 |
A Comparative study of standards and
practices related to information security management. Evangelos D.
Frangopoulos, UNISA, South Africa
|
Categorizing vulnerabilities using data
clustering techniques. Yun (Lillian) Li, University of Pretoria,
South Africa
|
Run-time Protocol-Conformance
Verification in Firewalls. Ulrich Ultes-Nitsche & InSeon Yoo,
University of Fribourg, Department of Computer Science, Switzerland
|
14:30-15:00 |
A case for information ownership in ERP
systems. Manfred P. Hertenberger, RAU, South Africa
|
Applying
similarities between immune systems and mobile agent systems in Intrusion
Detection. Marek Zielinski , UNISA, South Africa
|
On Privacy and the Web. Wesley
A Brandi, University of Pretoria, South Africa
|
15:00-15:30 |
Are Current B2B Security Standards
Antithetical to Global Interoperability? Maree Pather, Port
Elizabeth Technikon, South Africa
|
|
Privacy Enhanced WAP Browsing with
mCrowds Anonymity Properties and Performance Evaluation of the mCrowds
system. Christer Andersson, Karlstad University, Sweden
|
15:30–16:00 |
Tea |
|
Stream 1:
Information Security Policies |
Stream 2:
Information Security Education and Training |
Stream 3:
Network Security |
16:00-16:30 |
A General Methodology for the
Development Of An Effective Information Security Policy. Arvish
Ramdeyal, University of Pretoria, South Africa
|
Applied Holistic Approach for Security
Awareness and Training. Computer games as means to increase users’
information and communication security awareness. Kjell N¨ackros,
Stockholm University and Royal Institute of Technology, Sweden
|
Utilizing Neural Networks for Effective
Intrusion Detection. Martin Botha, Port Elizabeth Technikon, South
Africa
|
16:30-17:00 |
Assessing the Policy Dimension of
Information Security. Telanie Grobler, RAU, South Africa
|
Organisational Learning Models for
Information Security Education. Johan van Niekerk, Port Elizabeth
Technikon, South Africa
|
Security Considerations in a Global
Message Service Handler Design. Johannes J van Eeden, Port Elizabeth
Technikon, South Africa
|