Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Paper title
Author name Day 1 Day 2 Day 3
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 2 - Tuesday 16 August 2011
Stream 7 – (Reviewed Papers)
Stream 8 – (Reviewed Papers)
Stream 9 – (Reviewed Papers)
Network and OS security
Session chair: Aubrey Labuschagne
Organizational security
Session chair: Professor Hennie Kruger
Trust
Session chair: Johan van Niekerk
13:00-13:30
A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network
Etienne Stalmans
Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data
Anne Kayem, Patrick Martin and Selim Akl
Analysing the fairness of trust-based Mobile Ad Hoc Network protocols
Ivan Burke, Renier van Heerden and Martin Olivier
13:30-14:00
An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs
Shaun Egan
A Property Based Security Risk Analysis Through Weighted Simulation Timo Winkelvos, Carsten Rudolph and Jürgen Repp
Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures Donovan Isherwood and Marijke Coetzee
14:00-14:30
Implementing Rootkits to address Operating System Vulnerabilities Manuel Corregedor and Sebastiaan Von Solms
Exploring the Human Dimension of TETRA Nico Pieter Fouche and Kerry-Lynn Thomson
Online Social Networks: Enhancing user trust through effective controls and identity management Ryan Galpin and Stephen Flowerday
14:30-15:00
Tea
Stream 10 - (Reviewed Papers)
Stream 11 - (Reviewed Papers)
Digital forensics
Session chair: Etienne Stalmans
Security management and education
Session chair: Professor Stephen Flowerday
15:00–15:30
Adding Digital Forensic Readiness to Electronic Communication using a Security Monitoring Tool
Franscois Van Staden and Hein Venter
Information Security Competence Test with regards to Password Management Paul Tarwireyi, Stephen Flowerday and Anass Bayaga
15:30-16:00
Network Forensics in a Clean-slate Internet Architecture Tinus Strauss and Martin Olivier
A Visualization and Modeling Tool for Security Metrics and Measurements Management Reijo Savola and Petri Heinonen
16:00-16:30
Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems Aleksandar Valjarevic and Hein Venter
Guidelines for the Creation of Brain Compatible Cyber Security Educational Material in Moodle 2.0 Rayne Reid, Johan Van Niekerk and Rossouw Von Solms
16:30-17:00
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness Stephen Serra and HS Venter