Table of Contents - Day 1 of Conference Programme

DAY 1 - Wednesday, 29 June 2005
07:30–09:00 Registration
  Session Chairperson:
09:00-09:10 Welcome address: Prof Jan Eloff, ISSA Conference Co-chair
09:10-09:50 Plenary session: Security and Privacy, DR Alf Zugenmaier, DoCoMo Communications Laboratories Europe GmbH
09:50-10:30 TBC
10:30-11:00 

Tea 

  Session Chairperson:
11:00-11:40  The Global KPMG IT Governance Survey, Graham Teare, KPMG, South Africa
11:40-12:20 Digital forensics, Dr Buks Lourens, Executive, Group Risk Services, Nedbank Group Limited
12:20-13:00 Outsourcing security, Lynette Flaxman,
13:00-14:00 

Lunch 

  Stream 1:
Management (Reviewed Papers)

Session Chairperson:
Stream 2:
State-of-the-Art (Reviewed Papers)

Session Chairperson:

Stream 3:
Industry (Reviewed Papers)

Session Chairperson:

14:00-14:30

Measuring Information Security Awareness - A West Africa Gold Mining Environment Case, HA Kruger, WD Kearney, North-West University (Potchefstroom Campus) + AngloGold Ashanti, South Africa
 
 

Securing SOAP Messages with a Global Message Handler and a Standardized Envelope, Maree Pather, L M Venter, Nelson Mandela Metropolitan University, South Africa

Invasion of the RFIDs: are we heading towards “Modern Times”?, Fabio Ghioni, Telecom Italia, Italy

14:30-15:00 A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective, Eduardo Da Cruz, L. Labuschagne, University of Johannesburg, South Africa
Foiling an Attack -- Defeating IPSec Tunnel Fingerprinting, Vafa D. Izadinia, Jan Eloff and Derrick Kourie, University of Pretoria, South Africa
Fighting spam in a corporate environment using open-source solutions - a case study, Pieter Blaauw, Pick 'n Pay Info Systems, South Africa
15:00-15:30 The Proliferation of Wireless Devices and its Role in Corporate Governance, R. Mulder, Rossouw von Solms, Nelson Mandela Metropolitan University, South Africa
Revisiting Reachability Management as a Multilateral Security Mechanism, Jacques Ophoff, Reinhardt Botha, Nelson Mandela Metropolitan University, South Africa
Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical, Norman Tinyiko Baloyi, ISACA, South Africa
15:30–16:00 

Tea 

  Stream 4:
Risk (Reviewed Papers)
 Session Chairperson:
Stream 5:
Frameworks (Reviewed Papers)

 Session Chairperson:

Stream 6:
Identification & Authentication (Reviewed Papers)

 Session Chairperson: 

16:00-16:30 Developing Threat Networks for Risk Analysis of Information Systems, Dennis Longley , Mark Allan Branagan , Queensland University of Technology, Australia
Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system, Jeffy Mwakalinga, Louise Yngström , Royal Institute of Technology / Stockholm University, Sweden
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors, Shingo Okamura, Maki Yoshida & Toru Fujiwara, Osaka University, Japan

 
16:30-17:00 A Framework for Information Security Risk Management Communication, Werner Bornman, L Labuschagne, University of Johannesburg, South Africa
A Framework for Evaluation of Information Systems Security, Job Asheri Chaula, Louise Yngström & Stewart Kowalski, Stockholm University/KTH, Sweden
Secure Authentication combined with Anonymity: The end of an oxymoron?, Evangelos D. Frangopoulos, Lucas M. Venter, Mariki M. Eloff, University of South Africa , South Africa
  Stream 7:
 (Research-in-progress Papers)

 Session Chairperson: 
Stream 8:
(Research-in-progress Papers)

 Session Chairperson: 

Stream 9:
(Research-in-progress Papers)

 Session Chairperson: 

17:00-17:15 Purpose Organisation, Wynand van Staden, Martin Olivier, University of Johannesburg, South Africa
A Framework for evaluating Information Security Risk Management Methodologies for SMMEs, Liesl van Niekerk, L Labuschagne , University of Johannesburg, South Africa
Hardware Implementation of AES-CCM for Robust Secure Wireless Network , Arshad Aziz, Habib Rehmatullah, National University of Sciences and Technology, Pakistan Navy Engineering College, Pakistan
17:15-17:30 Proposing a Secure XACML architecture ensuring privacy and trust   Yared Keleta, M. Coetzee , J.H.P Eloff, H.S Venter, University of Pretoria, South Africa
An Investigation of Information Security in Small and Medium Enterprises (SME’s) in the Eastern Cape, Chris Upfold, Rhodes University, South Africa
A Model for Spam Prevention in Voice over IP Networks using Anonymous Verifying Authorities, Neil Croft, University of Pretoria, South Africa
17:30-17:45 File Integrity Checkers: State of the Art and Best Practices, Yusuf M Motara, Barry Irwin, Rhodes University, South Africa
An Investigating into Information Security compliance regulations in the South African financial sector, Rabbie Maphakela, D. Pottas & Rossouw von Solms, Nelson Mandela Metropolitan University, South Africa
Security Scheme for Mobile Agent System in E-Commerce Scenario, Rajwinder Singh, A.K.Sarje, Indian Institute of Technology Roorkee, India
17:45-18:00 Security of Real-Time Multimedia: A brief survey, Bradley Clayton, Barry Irwin & Alfredo Terzoli , Rhodes University, South Africa
A more secure e-commerce environment based on a self-contained biometric USB memory stick, Darek Janiszyn, Basie von Solms, University of Johannesburg, South Africa