Table of Contents - Day 2 of Conference Programme

DAY 2 - Thursday, 1 July 2004
09:00-14:00  Invited Speaker Presentations (Stream 4)

13:00-14:00 

Lunch 

  Stream 5:
 Web Services Security
Stream 6:
Enterprise-wide IS
Stream 7:
Legal perspective
14:00-14:30 Integrated Security System based on Security Assertion Markup Language Standard. Jeffy Mwakalinga, Royal Institute of Technology, Sweden The “Art” of Log Correlation. Tools and Techniques for Correlating Events and Log Files. Dario Forte, University of Milano, Italy
Legality of Monitoring E-Mail at the Workplace: A Legal Update. Mariette Jones, Technikon Witwatersrand, South Africa
14:30-15:00 A Virtual Machine for Security in a Relational Database Management System: Design Issues. Wynand van Staden, RAU, South Africa A framework for aligning Information Security Risk Management methods with IT Governance Recommendations. W.G. Bornman, RAU, South Africa
Intrinsic legal issues in IT Security. Respickius Casmir, Stockholm University/KTH, Sweden
15:00-15:30 A logic-based access control approach for Web Services. M. Coetzee, Pretoria University, South Africa
A framework for monitoring insider misuse of IT applications. A.H.Phyo, University of Plymouth, Plymouth, United Kingdom
South African Online Banking: Who Carries the Risk? Anna Granova, Constitutional Court of South Africa, South Africa
15:30-16:00 

Tea 

  Stream 5:
Access Control
Stream 6:
Software Security
Stream 7:
Information Security Case studies
16:00-16:30  Biometric Protection of Smartcards Through Fingerprint Matching: A Technological Overview and Possible Directions. Evangelos D. Frangopoulos, UNISA, South Africa Unified Architecture for Automatic Software Updates. Dominic White, Rhodes University, South Africa Case Studies of Japan, South Korea and China in Implementation of IPv6. Say Joe, KT (Korea’s Largest Telecommunications Service Provider), Korea
16:30-17:00 An Investigation into Access Control for Mobile Devices. Stephen Perelson, Port Elizabeth Technikon, South Africa Towards Hippocratic Log files. Andrew Rutherford , Port Elizabeth Technikon, South Africa The Protection of Public Health Data - A Case Study. S. Nkundlaa, Border Technikon, South Africa
 
19:00-00:00 

Gala dinner