Table of Contents - According to Paper Title

A Case For Information Ownership In Erp Systems

Manfred P. Hertenberger

A Comparative Study Of Standards And Practices Related To Information Security Management

Evangelos D. Frangopoulos

A Framework For Aligning Information Security Risk Management Methods With It Governance Recommendations

W.G. Bornman

A Framework For Monitoring Insider Misuse Of It Applications

A.H.Phyo

A General Methodology For The Development Of An Effective Information Security Policy

Arvish Ramdeyal

A Logic-Based Access Control Approach For
Web Services

M. Coetzee

A Unified Architecture For Automatic Software Updates

Dominic White

A Virtual Machine For Security In A Relational Database Management System: Design Issues

Wynand van Staden

Advanced Platform For Corporate Incident Detection And Management

Fabio Ghioni

An Investigation Into Access Control For Mobile Devices

Stephen Perelson

An Investigation Into Computer Forensic Tools

K.K. Arthur

Applied Holistic Approach For Security
Awareness And Training - Computer Games As Means To Increase Users’ Information And Communication Security Awareness

Kjell N¨ackros

Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection

Marek Zielinski

Are Current B2b Security Standards Antithetical To Global Interoperability?

Maree Pather

Assessing The Policy Dimension Of Information Security

Telanie GROBLER

Biometric Protection Of Smartcards Through Fingerprint Matching: A Technological Overview And Possible Directions

Evangelos D. Frangopoulos

Case Studies Of Japan, South Korea And China In Implementation Of IPv6

Say Joe

Categorizing Vulnerabilities Using Data Clustering Techniques

Yun (Lillian) Li

High Data Rate 8-Bit Crypto Processor

Sheikh Muhammad Farhan

Integrated Security System Based On Security Assertion Markup Language Standard

Jeffy Mwakalinga

Intrinsic Legal Issues In It Security

Respickius Casmir

Legality Of Monitoring E-Mail At The Workplace: A Legal Update

Mariette Jones

On Privacy And The Web

Wesley A Brandi

Organisational Learning Models For Information Security Education

Johan van Niekerk

Privacy Enhanced Wap Browsing With Mcrowds
Anonymity Properties And Performance Evaluation Of The Mcrowds System

Christer Andersson

Propagating Trust In The Web Services Framework

Anitta Thomas

Run-Time Protocol Conformance Verification In Firewalls

Ulrich Ultes-Nitsche

Security Considerations In A Global Message Service Handler Design

Johannes J van Eeden

South African Online Banking: Who Carries The Risk?

Anna Granova

The “Art” Of Log Correlation - Tools And Techniques For Correlating Events And Log Files

Dario Forte

The Protection Of Public Health Data - A Case Study

S. Nkundlaa

Towards Hippocratic Log Files

Andrew Rutherford

Using A Central Data Repository For Biometric Authentication In Passport Systems

Morné Breedt

Utilizing Neural Networks For Effective Intrusion Detection

Martin Botha