Home
Preface
Introduction
Conference Committee
Reviewing Committee
Review Process
Sponsors & Organisers
Peer-reviewed Papers
Day 1 Day 2 Day 3 Author name Paper title
Research Papers
Invited Speaker Papers
Contact
Table of Contents - According to Paper Title
A Case For Information Ownership In Erp Systems
Manfred P. Hertenberger
A Comparative Study Of Standards And Practices Related To Information Security Management
Evangelos D. Frangopoulos
A Framework For Aligning Information Security Risk Management Methods With It Governance Recommendations
W.G. Bornman
A Framework For Monitoring Insider Misuse Of It Applications
A.H.Phyo
A General Methodology For The Development Of An Effective Information Security Policy
Arvish Ramdeyal
A Logic-Based Access Control Approach For Web Services
M. Coetzee
A Unified Architecture For Automatic Software Updates
Dominic White
A Virtual Machine For Security In A Relational Database Management System: Design Issues
Wynand van Staden
Advanced Platform For Corporate Incident Detection And Management
Fabio Ghioni
An Investigation Into Access Control For Mobile Devices
Stephen Perelson
An Investigation Into Computer Forensic Tools
K.K. Arthur
Applied Holistic Approach For Security Awareness And Training - Computer Games As Means To Increase Users’ Information And Communication Security Awareness
Kjell N¨ackros
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Marek Zielinski
Are Current B2b Security Standards Antithetical To Global Interoperability?
Maree Pather
Assessing The Policy Dimension Of Information Security
Telanie GROBLER
Biometric Protection Of Smartcards Through Fingerprint Matching: A Technological Overview And Possible Directions
Case Studies Of Japan, South Korea And China In Implementation Of IPv6
Say Joe
Categorizing Vulnerabilities Using Data Clustering Techniques
Yun (Lillian) Li
High Data Rate 8-Bit Crypto Processor
Sheikh Muhammad Farhan
Integrated Security System Based On Security Assertion Markup Language Standard
Jeffy Mwakalinga
Intrinsic Legal Issues In It Security
Respickius Casmir
Legality Of Monitoring E-Mail At The Workplace: A Legal Update
Mariette Jones
On Privacy And The Web
Wesley A Brandi
Organisational Learning Models For Information Security Education
Johan van Niekerk
Privacy Enhanced Wap Browsing With Mcrowds Anonymity Properties And Performance Evaluation Of The Mcrowds System
Christer Andersson
Propagating Trust In The Web Services Framework
Anitta Thomas
Run-Time Protocol Conformance Verification In Firewalls
Ulrich Ultes-Nitsche
Security Considerations In A Global Message Service Handler Design
Johannes J van Eeden
South African Online Banking: Who Carries The Risk?
Anna Granova
The “Art” Of Log Correlation - Tools And Techniques For Correlating Events And Log Files
Dario Forte
The Protection Of Public Health Data - A Case Study
S. Nkundlaa
Towards Hippocratic Log Files
Andrew Rutherford
Using A Central Data Repository For Biometric Authentication In Passport Systems
Morné Breedt
Utilizing Neural Networks For Effective Intrusion Detection
Martin Botha