Consultation to Industry
Publications - Journals
Publications - Conferences
Download Journal Papers
Professional Activities
Membership
Home
e-mail: eloff@cs.up.ac.za
telephone number: (012) 999-9100
|
Prof. Jan Eloff
Papers Published in Internationally Accredited Journals
2010
|
Da Veiga A., Eloff, J.H.P., 2010, A Framework and assessment instrument for Information Security Culture, in Computers & Security, 29(2), 196-207, March 2010
|
2010
|
Rossudowski, A.M., Venter, H.S,, Eloff, J.H.P., 2010, A Security Privacy Aware Architecture and Protocol for a Single Smart Card used for Multiple Services, Computers & Security, 29(4) 393-409, June 2010
|
2009
|
Dlamini, M., Eloff, J.H.P., Eloff, M.M., 2009, Information Security: The Moving Target, Computers & Security 28(3-4), pp. 189-198, May-June 2009, available online at http://dx.doi.org/10.1016/j.cose.2008.11.007
|
2009
|
Höne, K., Eloff, J.H.P., 2009, Information Security Governance: Business requirements and research directions, Corporate Ownership and Control Journal, Volume 7, Issue 1, Fall 2009 (Continued - 2)
|
2009
|
Modiba, F., Ketcha-Ngassam, E., Eloff, J.H.P., 2009, Information, Communication and Technology Usage by Women-Owned Small, Medium and Micro Enterprises in Gauteng, South Africa in The International Journal of Interdisciplinary Social Sciences, Volume 4, Issue 5, pp.159-172. August 2009
|
2009
|
Padayachee, K., Eloff J.H.P., 2009, Adapting Usage Control as a Deterrent to address the inadequacies of Access Controls in Computers & Security, Volume 28, Issue 7, pp 536-544, (October 2009)
|
2008
|
Bihina Bella, M., Eloff, J.H.P., Olivier, M.S., 2007, A fraud management system architecture for Next-Generation Networks, accepted for publication in Forensic Science International
|
2008
|
Da Veiga A., Eloff, J.H.P., A Framework for Information Security Culture, accepted for publication in Computers & Security.
|
2008
|
Dlamini, M., Eloff, J.H.P., Eloff, M.M., Information Security: The Moving Target, accepted for publication in Computers & Security
|
2008
|
Obiedkov, S., Kourie, D.G., Eloff, J.H.P., 2008, Building Access Control Models with Attribute Exploration, accepted for publication in Computers & Security.
|
2008
|
Li, Y., Venter, H.S., Eloff, J.H.P., 2008, Standardising Vulnerability Categories, Computers & Security, 27(3-4), 63-122 (May-June 2008).
|
2008
|
Lo, J.L.C., Bishop, J, Eloff, J.H.P., SMSSec: an end-to-end protocol for secure SMS, Computers & Security 27(5-6) 154-167
|
2007
|
Da Veiga A., Eloff, J.H.P., 2007, "An Information Security Governance Framework" accepted for publication in Information Systems Management.
|
2007
|
Coetzee, M., Eloff, J.H.P., 2007, Web services access control architecture incorporating trust, Internet Research, 17(3): 291-305, ISSN: 1066-2243, Emerald Group Publishing Limited
|
2007
|
Lo, J.L.C., Bishop, J, Eloff, J.H.P., SMSSec: an end-to-end protocol for secure SMS, accepted for publication in Computers & Security |
2007
|
Da Veiga A., Eloff, J.H.P., 2007, Information security culture - validation of an assessment instrument, Southern African Business Review, 11(1): April 2007.
|
2006
|
Fei, B.K.L., Eloff, J.H.P., Olivier, M.S., Venter, H.S., 2006, The use of self-organising maps for anomalous behaviour, detection in a digital investigation, Forensic Science International, 162(1-3): Oct 33-37, Elsevier.
|
2006
|
Izadinia, V.D., Kourie, D.G., Eloff, J.H.P., 2006, Uncovering Identities: a study into VPN tunnel fingerprinting, Computers & Security, 25(2): March 97-105.
|
2006
|
Morkel, T., Eloff, J.H.P., Olivier, M.S., 2006, Using image steganography for decryptor distribution, Lecture Notes in Computer Science, 4277, LNCS - I, 322-330, Publisher Springer-Verlag Berlin/Heidelberg, ISSN: 03029743.
|
2006
|
Obiedkov, S., Kourie, D.G., Eloff, J.H.P., 2006, On Lattices in Access Control Models, Lecture Notes in Artificial Intelligence, LNAI 4068, 374-387, Edited by J.G. Carbonell & J. Siekmann, Subseries of Lecture Notes in Computer Science, Springer-Verlag Berlin, ISSN: 0302-9743.
|
2006
|
Wojcik, M., Eloff, J.H.P., Venter, H.S., 2006, Trust Model Architecture: Defining Prejudice by Learning, Lecture Notes in Computer Science, 4083, 182-191, Publisher Springer Berlin / Heidelberg, ISBN 978-3-540-37750-4.
|
2005
|
Izadinia, VD, Kourie, DG, Eloff, JHP, (2006) Uncovering Identities: a study into VPN tunnel fingerprinting, submitted for publication in Computers & Security
|
2005
|
Coetzee, M, Eloff, JHP (2005) Autonomous trust for Web Services, Submitted for publication in Journal of Internet Research
|
2005
|
Eloff, JHP, (2005) Can machines trust one another? Submitted for publication in Computers & Security
|
2005
|
Eloff J.H.P., Eloff M.M., (2005) Information Security Architecture, Accepted for publication in Computers Fraud & Security for publication
|
2005
|
Granova, A, Eloff, JHP, (2005) A legal overview of phishing, Computer Fraud & Security Volume 2005, Issue 7 , July 2005, Pages 6-11
|
2005
|
Coetzee, M, Eloff, JHP, (2005) An Access Control Framework for Web Services, Information Management and Computer Security, Vol. 13 No. 1, 2005, Emerald Group Publishing Limited, 0968-5227
|
2004
|
Venter, HS, Olivier, MS, Eloff, JHP, PIDS: A Privacy Intrusion Detection System, Internet Research, Vol. 14(5), pp 360-365, (ISSN 1066-2243)
|
2004
|
Granova A, Eloff, JHP, (2004) Identity Theft, Computer Fraud & Security, Vol. 2004, Issue 11, pp 7-11 (ISSN 1361-3723) Elsevier Advanced Technology
|
2004
|
Coetzee, M, Eloff, JHP, (2004) Towards Web Services Access Control, Computers & Security, Vol. 23 (7), pp 559-570 (ISSN 0167-4048)
|
2004
|
Venter, HS, Eloff, JHP (2004) Vulnerability forecasting-a conceptual model, Computers & Security, Vol. 23 (6), pp 489-497 (ISSN 0167-4048)
|
2003
|
Venter, HS, Eloff, JHP (2003), State of the art intrusion detection and vulnerability scanning, South African Computer Journal, SACJ 32, December 2003 (ISSN 1015-7999)
|
2003
|
Venter, HS, Eloff, JHP (2003), Evaluating Vulnerability Scanners Using Harmonised Vulnerability Categories, South African Computer Journal, SACJ 31, pp 40-45, December 2003 (ISSN 1015-7999)
|
2003
|
Johnston J, Eloff, JHP, Labuschagne L (2003), Security and human computer interfaces, Computers & Security Vol. 22 (8), pp 675-684, December 2003
|
2003
|
Eloff, JHP, Granova A, (2003) Computer Crime Case Analysis, Computer Fraud & Security Vol. 2003, Issue 10, pp 14-17 ISSN: 1361-3723, Elsevier Advanced Technology
|
2003
|
Venter HS, Eloff, JHP (2003) Assessment of Vulnerability scanner, Network Security, pp 11-16, February 2003, ISSN 1353-4858
|
2003
|
Venter HS, Eloff, JHP (2003) Taxonomy for Information security technologies, Computers & Security Vol. 22 (4), pp299-307
|
2002
|
Venter HS, Eloff, JHP (2002) Harmonising Vulnerability Categories, South African Computer Journal, No. 29, pp. 24 - 31
|
2002
|
Venter HS, Eloff JHP (2002) Vulnerabilities categories for intrusion detection systems Computers & Security, Vol. 21 (7), pp 617-619
|
2002
|
Botha, R., Eloff, J. (2002) An Access Control Architecture for XML documents in workflow environments, South African Computer Journal, No. 28, pp. 3 - 10
|
2002
|
Karin Hone, J.H.P. Eloff, (2002), What makes an Effective Information Security Policy? Network Security, Vol. 2002 (6), pp. 14- 16
|
2002
|
Karin Hone, J.H.P. Eloff, (2002), Information Security Policy - What do International Information Security Standards Say? Computers & Security, Vol. 21 (5), pp. 402 - 409
|
2002
|
Smith, E., Eloff, J.H.P. (2002) A Prototype for Assessing Information-Technology Risks in Health Care, Computers & Security, Vol. 21
|
2001
|
Botha, R., Eloff, J. (2001) A Framework for Access Control in Workflow Systems, Information Management and Computer Security, Vol. 9 No 3
|
2001
|
Botha, R., Eloff, J. (2001) Access Control in Document-centric Workflow Systems - An Agent-based Approach, Computers & Security, Vol. 20, No. 6, Elsevier
|
2001
|
Botha, R., Eloff, J. (2001) Separation of Duties for Access Control Enforcement in Workflow Environments IBM Systems Journal, Vol. 40, No. 3
|
2001
|
Perelson, S., Botha, R., Eloff, J. (2001) Separation of Duty Administration, South African Computer Journal, No 27, pp 64-69
|
2001
|
Smith, E., Eloff, J.H.P. (2001) A New Approach to Risk Management in the Health-Care Domain South African Computer Journal, No 27, pp 2-11
|
2001
|
Trompeter, C.M., Eloff, J. (2001) A Framework for the Implementation of Socio-ethical Controls in Information Security Computers & Security, Vol. 20, No. 5, pp 384 - 391
|
2000
|
Knorr, K., Stormer, H., Eloff, J.H.P. (2000) A Model for Security in Agent-based Workflows Informatik / Informatique No.6
|
2000
|
Labuschagne, L., Eloff, J.H.P. (2000) Electronic commerce: the information security challenge Information Management & Computer Security, Vol.8 (2&3)
|
2000
|
Smith, E, Eloff, J.H.P. (2000) Using cognitive fuzzy modeling for enhanced risk assessment in a health-care institution IEEE - Intelligent systems and their applications, Vol. 15 No.2, PP 69-75
|
2000
|
Venter, H., Eloff, J.H.P. (2000) Network Security: Important Issues Network Security, Vol. 6
|
1999
|
Eloff, J.H.P. & Prinsloo, J.J. (1999) Web Browsers: Information Security issues, Computer Fraud & Security November 1999, ISSN: 1361-3723, Elsevier Advanced Technology
|
1999
|
Smith, E, Eloff, J.H.P. (1999) Security in health-care information systems - current trends, International Journal of Medical Informatics Vol. 54, Issue 1
|
1998
|
Labuschagne, L. Eloff, J.H.P. (1998) The Use of Real-time Risk Analysis to Enable Dynamic Activation of Countermeasures Computer & Security Vol. 17, No. 4
|
1998
|
Labuschagne, L., Eloff, J.H.P. (1998) Real-time Risk Analysis using Java concepts Information Management and Computer Security Vol. 6, No. 5
|
1998
|
Van Buren, S., Eloff, J.H.P. (1998) Framework for evaluating security protocols in a banking environment Computer Fraud & Security ISSN 1361-3723, Elsevier
|
1998
|
Van der Merwe, G., Eloff, J.H.P. (1998) Software source code, visual risk analysis: an example Computers & Security Vol. 17, No. 3
|
1998
|
Venter, H.S., Eloff, J.H.P. (1998) Data Packet Intercepting on the Internet: How and Why? Computers & Security Vol. 17, No. 8
|
1997
|
Botha, R., Eloff, J.H.P., (2001) Information Security in a client/server environment, Elektron Vol. 14, No. 2
|
1997
|
De Ru, W.G., Eloff, J.H.P. (1997) Enhanced Password Authentication through Fuzzy Logic IEEE Intelligent Systems & their Applications Vol. 12, No. 6
|
1997
|
Labuschagne, L., Eloff, J.H.P. (1997) Improved System-Access Control Using Complementary Technologies Computers & Security Vol. 16, No. 6
|
1996
|
De Ru, W.G., Eloff, J.H.P. (1996) Reinforcing password authentication with typing biometrics South African Computer Journal Vol. 17
|
1996
|
De Ru, W.G., Eloff, J.H.P. (1996) Risk analysis modelling with the use of fuzzy logic Computers & Security, Vol. 15, No. 3
|
1996
|
Eloff, J.H.P., Holbein, R., Teufel S (1996) Security Classification for Documents Computers & Security Vol. 15, No. 1
|
1995
|
Booysen, H.A.S., Eloff, J.H.P. (1995) Classification of objects for improved access control Computers & Security Vol. 14, No. 3, North-Holland
|
1995
|
Eloff, J.H.P. (1995) Information Security: State-of-the-art overview IT Review, (Official journal of the Computer Society of South Africa)
|
1994
|
Badenhorst, K.P., Eloff, J.H.P. (1994) TOPM: A Formal approach to the optimisation of Information Technology Risk Management Computers & Security Vol. 13, No. 5, North-Holland
|
1994
|
Bauknecht, K., Eloff, J.H.P., Teufel, S (1994) Security management in Computer Supported Co-operative Work Technical report, Institut fur Informatik, University of Zurich, Zurich, Switzerland
|
1994
|
Eloff, J.H.P., Holbein, R., Teufel S (1994) Security Classification for Documents Technical report, Institut fur Informatik, University of Zurich, Zurich, Switzerland
|
1993
|
Badenhorst, K.P., Eloff, J.H.P., Labuschagne, L. (1993) A Comparative Framework for Risk Analysis Methods Computers & Security Vol. 12, No. 9
|
1993
|
Eloff, J.H.P., Klut, J.P. (1993) MethoDex: A Framework for an expert system development methodology Lecture notes in Artificial Intelligence, Springer-Verlag
|
1990
|
Badenhorst, K.P., Eloff, J.H.P. (1990) Computer security methodology: risk analysis and project definition Computers & Security Vol. 9, No. 4, pp 339-346 North-Holland
|
1990
|
Eloff, J.H.P. (1990) Computer Security: Research and Practice (A) South African Journal for Science, Vol. 86, March 1990
|
1990
|
Eloff, J.H.P. (1990) Managing Computer Security: Methodology and Policy Information Age, Vol. 12 No 4, Elsevier, UK
|
1990
|
Eloff, J.H.P., Von Solms, R., Von Solms, S.H. (1990) Computer Security Management: a framework for effective management involvement, Information Age
|
1989
|
Badenhorst, K.P., Eloff, J.H.P. (1989) Framework for a methodology for the life cycle of computer security in an organisation Computers & Security Vol. 8, North-Holland
|
1989
|
Eloff, J.H.P. (1989) A methodology for the implementation of computer security in an organisation Computers & Security, North-Holland
|
1989
|
Eloff, J.H.P., Mostert, D.N.J., Von Solms, S.H. (1989) A methodology for measuring user satisfaction Information Processing & Management, Vol. 25, No. 5, Pergamon Press
|
1988
|
Eloff, J.H.P. (1988) Computer Security Policy: Important issues Computers & Security Vol. 7, No 6, pp 559 - 562 North-Holland
|
1985
|
Eloff, J.H.P. (1985) The development of a specification language for a computer security system, Computers & Security (4)
|
1983
|
Eloff, J.H.P. (1983) Selection Process for Security Packages Computers & Security Vol. 2, No. 3
|
|
Return to Top |
|