Consultation to Industry
Publications - Journals
Publications - Conferences
Download Journal Papers
Professional Activities
Membership
Home

e-mail: eloff@cs.up.ac.za
telephone number: (012) 999-9100
Prof. Jan Eloff

Papers Presented at Conferences


2010 Mtsweni, J., Ntuli, M. & Eloff J.H.P., 2010, Developing m-Services for Emerging Markets: a case of South Africa, 1st International Conference on Services in Emerging Markets, September 23-24, 2010, Indian School of Business, Gachibowli, Hyderabad, http://www.isb.edu/ICSEM2010/
2010 Veerasamy N., Eloff J.H.P., 2010, Motivation and Requirements for Determining a Network Warfare Capability in the proceedings of The European Conference on Information Warfare and Security hosted strategyinternational.org and the Department of Applied Informatics, University of Macedonia in Thessaloniki, Greece on the 1-2 July 2010.
2009 Dlamini, M.T., Eloff, M.M., Eloff, J.H.P. & Hone, K. 2009, BC3I - Towards requirements specification for preparing an Information Security budget, Proceedings of the ISSA 2009 Conference, Editors: Hein Venter, Marijke Coetzee and Les Labuschagne, pp 53 - 67, ISBN 978-1-86854-740-1, 6 - 8 July 2009, Johannesburg, South Africa
2009 Dlamini, M.T., Eloff, M.M. & Eloff, J.H.P. 2009, Internet of Things: Emerging and Future Scenarios from an Information Security Perspective, Proceedings of SATNAC 2009: Convergence - 21st Century Lifestyle Enabler, 31 August - 2 September 2009. Royal Swazi Spa, Ezulwini, Swaziland.
2009 Eloff, J.H.P., Eloff, M.M., Dlamini, M.T. & Zielinski M.P., 2009, Internet of People, Things and Services - The Convergence of Security, Trust and Privacy, 3rd Annual CompanionAble Consortium Workshop - IoPTS, (Internet of People, Things and Services) 02 December 2009, Novotel Brussels - Brussels, Online proceedings available at http://www.companionable.net/index.php?option=com_phocadownload&view=category&id=7:3rd-companionable-workshop-iopts-proceedings&Itemid=6
2009 Martim E., Dlamini, M., Van Greunen D., Eloff J.H.P., Herselman M., 2009, Is Buying and Transacting Online Easier and Safer than Down Town? : An Emerging Economy Perspective accepted at the 4th International Conference on Information Warfare and Security, Breakwater Lodge, Cape Town, South Africa on the 26-27 March 2009.
2008 Venter H.S., Eloff J.H.P., Wojcik M, 2008, Implementing Prejudice in Trust Models: A Prototype, in Proceedings of The 13th Nordic Workshop on Secure IT Systems, 9-10 October, 2008, Copenhagen, Denmark
2008 Adigun, E.A., Eloff J.H.P., 2008, Implementing a Trusted Service-Oriented Network Environment, in Proceedings of the SATNAC 2008 Conference, 7 . 10 September 2008, Wild Coast Sun, Eastern Cape Coast, South Africa
2008 Veerasamy N. Eloff J.H.P., 2008, The Application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment: CESSE 2008 (International Conference on Computer, Electrical, and Systems Science, and Engineering -France)
2008 Kohn, M., Eloff J.H.P., Olivier, M., 2008, UML Modeling of Digital Forensic Process Models (DFPMs) in Venter H.S., Eloff, M.M., Eloff, J.H.P. and Labuschagne L, (Editors) (2008), Proceedings of the ISSA 2008 Innovative Minds Conference, 7 . 9 July 2008 School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, ISBN 978-1-86854-693-0, pp 149-162
2008 Veerasamy N. Eloff J.H.P., 2008, Towards a Framework for a Network Warfare Capability in Venter H.S., Eloff, M.M., Eloff, J.H.P. and Labuschagne L, (Editors) (2008), Proceedings of the ISSA 2008 Innovative Minds Conference, 7 . 9 July 2008 School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, ISBN 978-1-86854-693-0, pp 405-422
2008 Arthur, KK. Olivier, MS. Venter, HS. Eloff, JHP. 2008, Considerations Towards a Cyber Crime Profiling System, in S Jakoubi, S Tjoa and ER Weippl, Proceedings of AReS 2008 - The Third International Conference on Availability, Security and Reliability, 1388-1393, IEEE, 2008
2007 Veerasamy N. Eloff J.H.P., 2007, Framework for the Establishment of a Honeynet, in Proceedings of the SATNAC 2007 Conference, 10 . 13 September 2007, Sugar Beach Resort, Mauritius
2007 Coetzee, M., Eloff J.H.P., 2007, A trust and context aware access control model for web services conversations, accepted for publication in Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus`07). September 3 - 7, 2007, Regensburg, Germany.
2007 Padayachee, K., Eloff J.H.P., 2007, Enhancing Optimistic Access Controls with Usage Control, accepted for publication in Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus`07). September 3 - 7, 2007, Regensburg, Germany
2007 Veerasamy N. Eloff J.H.P., 2007, Framework for the Establishment of a Honeynet, accepted for publication in Proceedings of the SATNAC 2007 Conference, 10 - 13 September 2007, Sugar Beach Resort, Mauritius
2007 Adigun, E.A., Eloff J.H.P., 2007, Defining a Trusted Service-Oriented Network Environment, in Proceedings of Second International Conference on Availability, Reliability and Security (ARES 2007 - The International Dependability Conference) Vienna 10-13 April 2007
2007 Rossudowski, A.M., Venter, H.S., Eloff J.H.P., 2007, Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis, in New Approaches for Security, Privacy and Trust in Complex Environments, Series: IFIP International Federation for Information Processing, 14-16 May 2007, Sandton, South Africa.
2006 Adigun, E.A., Lutu, P.E.N., Eloff J.H.P., 2006, Mobile and Wireless Technology: Making a World of Difference, in Bytheway A & Strümpfer C (eds), Proceedings: Community Informatics for Developing Countries, ISBN 0-620-37058-0, 31 Aug-2 Sept 2006, Cape Town, South Africa.
2006 Coetzee, M., Eloff, J.H.P., 2006, A Framework for Web Services Trust. 2006. in Proceedings of the 21st International Information Security Conference (SEC 2006), Security and Privacy in Dynamic Environments. Series: IFIP International Federation for Information Processing, Vol 201 Fischer-Hübner, S.; Rannenberg, K.; Yngström, L.; Lindskog, S. (Eds.) Springer, 2006, XVI, 494 p., Hardcover ISBN: 0-387-33405-X, 22-24 May 2006, Karlstad, Sweden.
2006 Fei, B.K.L., Eloff, J.H.P., Olivier, M.S., Venter, H.S., 2006, Network Forensics: Web Proxy Log Analysis. Proceedings of the Second Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January/February 2006.
2006 Kohn, M., Olivier, M., Eloff J.H.P., 2006, Framework for a Digital Forensic Investigation, in H.S Venter, J.H.P. Eloff, L. Labuschagne and M.M. Eloff (eds), Proceedings of the 6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference, July 2006, South Africa, ISBN 1-86854-636-5.
2006 McManus, L., Eloff J.H.P., 2006, Using IT Benchmarking Principles to Design an Information Security Benchmark Model, in H.S. Venter, J.H.P. Eloff, L. Labuschagne and M.M. Eloff (eds), Proceedings of the 6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference, July 2006, South Africa, ISBN 1-86854-636-5.
2006 Padayachee, K., Eloff J.H.P., 2006 The Next Challenge: Aspect-Oriented Programming, in Proceedings of IASTED, The Sixth IASTED International Conference on Modelling, Simulation, and Optimilzation, ~MSO 2006~ September 11-13, 2006 Gabarone, Botswana.
2006 Padayachee, K., Eloff J.H.P., 2006, An Aspect-Oriented Model to Monitor Misuse, Proceedings of The International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE) 2006 , December 4 - 14, 2006, University of Bridgeport, USA.
2006 Padayachee, K., Eloff J.H.P., 2006, Aspect-Oriented Mandatory Access Control, In: Judith Bishop, Derrick Kourie (eds), Proceedings of the annual South African Institute of Computer Scientists and Information Technologists Conference (SAICSIT) Service-oriented Software and Systems, South Africa, ISBN: 1-59593-567-3, 9-11 October 2006, Somerset West, South Africa.
2006 Wojcik, M., Venter, H.S., Eloff, J.H.P., 2006, Trust Model Evaluation Criteria: A Detailed Analysis of Trust Representation, Proceedings of The Next Generation Services, the Network @ Work, Southern African Telecommunications Networks and Applications Conference (SATNAC) 2006, ISBN: 0-620-37043-2, 3 - 6 September 2006, Western Cape, South Africa.
2006 Wojcik, M., Venter, H.S., Eloff, J.H.P., 2006, Trust Model Evaluation Criteria: A Detailed Analysis of Trust, in H.S. Venter, J.H.P. Eloff, L. Labuschagne and M.M. Eloff (eds), Proceedings of the 6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference, July 2006, South Africa, ISBN 1-86854-636-5.
2005 Loock, M, Eloff, JHP, (2005) A new Access Control model based on the Chinese Wall Security Policy Model , Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
2005 Laubscher, R, Rabe, DJ, Olivier, M, Eloff, JHP & Venter, HS, (2005) Applying computer forensic principles in evidence collection and analysis for a computer-based programming assessment Proceedings of IFIP WG 11.9 First International Conference on Digital Forensics, February 13-16, 2005, Orlando, Florida
2005 Fei, BKL, Eloff, JHP, Venter, HS & Olivier, M, (2005) Exploring Data generated by Computer Forensic Tools with Self-Organizing Maps Proceedings of IFIP WG 11.9 First International Conference on Digital Forensics, February 13-16, 2005 Orlando, Florida
2005 Fei, BKL, Eloff, JHP, Venter, HS & Olivier, M, (2005) Exploring Data generated by Computer Forensic Tools with Self-Organizing Maps Proceedings of IFIP WG 11.9 First International Conference on Digital Forensics, February 13-16, 2005 Orlando, Florida
2005 Coetzee, M, Eloff, JHP, (2005), Metadata for trust in service-oriented architectures, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
2005 Loock M Eloff, JHP, Investigating the usage of the Chinese Wall Security Policy model for Data Mining, Proceedings of the 4th International Symposium on Information and Communication Technology, 3-6 January 2005, Cape Town, South Africa
2005 Bihina, M, Eloff, JHP, Olivier, MS, (2005) Using the IPDR standard for NGN billing and fraud detection, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
2005 Fei, BKL, Tillwick, H, Eloff, JHP, Venter HS, and Olivier, MS, (2005), Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
2005 Keleta, Y, Coetzee, M., Eloff, JHP, Venter, HS, (2005), Proposing a Secure XACML architecture ensuring privacy and trust, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
2005 Laubscher, R, Rabe, DJ, Olivier, MS, Eloff JHP, Venter, HS, (2005), Computer forensics for a computer-based assessment: the preparation phase, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
2005 Laubscher, R, Rabe, C, Olivier, M, Venter, HS, Eloff, JHP, (2005), The Role of Key loggers in Computer-based Assessment Forensics, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists Conference (SAICSIT), September 2005, White River, South Africa
2005 Tshivhase, FE, Venter, HS, Eloff, JHP, (2005), Implementing Application and Network Security Using Aspect-oriented Programming, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2005, 12-14 September 2005, Drakensberg, South Africa, ISBN 0-620-34908-5
2005 Fei, BKL, Venter, HS, Olivier, MS, Eloff, JHP, (2005), Using Computer Forensic Tools and Self-Organising Maps for Detecting Anomalous Behaviours, The 17th Meeting of the International Association of Forensic Sciences (IAFS 2005), 21-26 August 2005, Hong Kong Convention and Exhibition Centre, Hong Kong
2005 Wojcik, M, Venter, HS, Eloff, JHP, Olivier, MS, (2005), Incorporating Prejudice into Trust Models to Reduce Network Overload, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2005, 12-14 September 2005, Drakensberg, South Africa, ISBN 0-620-34908-5
2005 Bihina Bella, M, Olivier, MS, Eloff, JHP, (2005), A fraud detection model for Next Generation Networks, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2005, 12-14 September 2005, Drakensberg, South Africa, ISBN 0-620-34908-5
2005 Venter, HS, Olivier, MS, Eloff, JHP, Botes, ME, Bayard, R, Nunes, R, (2005), Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database, Proceedings of the Fifth International Network Conference (INC 2005). pp. 327-386 ISBN 960-7475-32-1, 5-7 July 2005, Samos Greece.
2005 Coetzee, M, Eloff, JHP, (2005), Autonomous Trust for Web Services, Proceedings of the Fifth International Network Conference (INC 2005). pp. 217-226. ISBN 960-7475-32-1, 5-7 July 2005, Samos Greece.
2005 Izadinia, VD, Eloff, JHP, Kourie, D, (2005) Foiling an Attack ? Defeating IPSec Tunnel Fingerprinting, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
2004 Tillwick, H, Neumann, T, Olivier, MS, Venter, HS, Eloff, JHP, (2005), Polar: Proxies collaborating to achieve anonymous webbrowsing, Proceedings of the Fifth International Network Conference (INC 2005). pp. 317 - 324. ISBN 960-7475-32-1, 5-7 July 2005, Samos Greece.
2004 Bihina Bella, M, Eloff, JHP, (2004) Requirements for Next-Generation networks billing systems, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2004, 6-8 September 2004, Spier Wine Estate, South Western Cape, South Africa
2004 Pillai MM, Eloff, JHP, Venter, HS, (2004), An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), October 2004, Stellenbosch, SA, Unisa Press, 1-58113-982-9
2004 Coetzee, M, Eloff, JHP, (2004) Access control for service-oriented computing, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2004, 6-8 September 2004, Spier Wine Estate, South Western Cape, South Africa
2004 Morkel, T, Eloff, JHP (2003) Encryption Techniques: A Timeline Approach, Proceedings of the Research in Progress at the 4th Annual International Information Security South Africa (ISSA) conference, July 2004
2004 Keleta YG, Eloff, JHP, (2004) Web services security policy integration, Proceedings of the annual Post Graduate Symposium of the South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), October 2004, Stellenbosch, SA, Unisa Press
2004 Fei, BKL, Eloff, JHP, Venter, HS, and Olivier, MS (2004), Classifying Computer Forensic Tools with the Aim of Extending the Functionality of EnCase, Proceedings of the annual Post Graduate Symposium of the South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), October 2004, Stellenbosch, SA, Unisa Press
2004 Venter, HS, Olivier, MS, Eloff, JHP, (2004) PIDS: A Privacy Intrusion Detection System, Proceedings of INC2004, Fourth International Network Conference, 5 - 7 July, Plymouth, UK
2004 Granova A, Eloff, JHP (2004) South African Online Banking: Who Carries The Risk? Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
2004 Li Y, Venter, HS, Eloff, JHP, (2004) Categorizing vulnerabilities using data clustering techniques, Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
2004 Eloff, MM, Kotzé P, Adesina-Ojo A, Eloff JHP, (2004), Accessible Computer Interaction for People with Disabilities - the Case of Quadriplegics, 6th International Conference on Enterprise Information Systems, Porto, Portugal, 14 - 17 April 2004
2004 Coetzee M, Eloff, JHP, (2004) A Logic-Based Access Control Approach for Web Services, Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
2004 Coetzee M, Eloff, JHP, (2004) Access control for networked Web Services, Proceedings of INC2004, Fourth International Network Conference, 5 - 7 July, Plymouth, UK
2003 Eloff, JHP (2003) State of the Art Vulnerability Detection and Suggestions for improvement, International Conference on Information and Communication Technology, 30 November - 2 December 2003, Cairo, Egypt
2003 Venter, HS, Eloff, JHP (2003), State of the art intrusion detection and vulnerability scanning, Proceedings of the annual Post Graduate Symposium of the South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), September 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-58113-774-5
2003 Venter, HS, Eloff, JHP (2003) Vulnerability Detection, Proceedings of the Annual International Information Security South Africa (ISSA) conference, July 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-86854-485-0, pp 89-98
2003 Eloff, JHP, Eloff, MM, (2003), Information Security Management - A New Paradigm, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), September 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-58113-774-5, pp130-136
2003 Eloff, MM, Eloff, JHP, (2003), Information Security Management System: processes and products Proceedings of IFIP SEC 2003, May 2003, Athens, Greece
2003 Coetzee M, Eloff, JHP (2003) Virtual enterprise control requirements, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), September 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-58113-774-5, pp. 285-294
2003 Coetzee M, Eloff, JHP (2003) Access Control for Web Services, Proceedings of the Annual International Information Security South Africa (ISSA) conference, July 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-86854-485-0 pp 99-112
2002 M Loock, JHP Eloff, 2002, Information Security Issues in Data Mining, Proceedings of SAICSIT, September 2002, Port Elizabeth, South Africa
2002 Hein Venter JHP Eloff, 2002, Enabling Businesses To Evaluate Intrusion Detection Tools, Proceedings of SAICSIT, September 2002, Port Elizabeth, South Africa
2002 JHP Eloff , SH von Solms, (2002) An Architecture For Information Security Management, IFIP Congress 2002, 17TH World Computer Congress, August 2002, Montreal, Canada
2002 JHP Eloff, (2002) Implementing an IT Security Infrastructure to fulfill your Organizational Objectives, Lisho Conference, September 2002, Randburg, South Africa
2002 K Hone, JHP Eloff, 2002, Information Security Policy - What do International Information Security Standards say?, Proceedings of ISSA2002, July 2002, Johannesburg, South Africa
2002 A Martins, JHP Eloff, 2002, Promoting information security culture through an information security culture model, Proceedings of ISSA2002,July 2002, Johannesburg, South Africa
2002 L Robbertze, JHP Eloff, 2002, Information Security Implementation Methodologies, Proceedings of ISSA2002, July 2002, Johannesburg, South Africa
2002 M Loock, JHP Eloff, 2002, Information Security Issues in Data Mining, Proceedings of ISSA2002, July 2002, Johannesburg, South Africa
2002 Hein Venter JHP Eloff, 2002, Generic Vulnerability Categories, Proceedings of ISSA2002, July 2002, Johannesburg, South Africa
2002 M Coetzee, JHP Eloff, 2002, Secure Database Connectivity On The WWW, Proceedings of ISSA2002
2002 M Coetzee, JHP Eloff, 2002, Secure Virtual Web Databases for an e-commerce Environment, Proceedings of IFIP SEC 2002, May 2002, Cairo, Egypt
2002 A Martins, JHP Eloff, 2002, Information Security Culture, Proceedings of IFIP SEC 2002, May 2002, Cairo, Egypt
2002 Eloff, M.M., Eloff J.H.P., (2002), Secure Human Computer Interaction: an Information Security Perspective, Proceedings of IFIP SEC 2002, May 2002, Cairo, Egypt,
2002 Eloff J.H.P., (2002), Information Management Architecture - an overview Information Security Architectures Workshop, Fribourg, Switzerland, February 2002
2002 Eloff J.H.P., (2002), Tactical level - an overview of the latest trends in risk analysis, certification, best practices and international standards Information Security Architectures Workshop, Fribourg, Switzerland, February 2002
2002 Eloff J.H.P., (2002), How to develop an Information Security Policy Information Security Architectures Workshop, Fribourg, Switzerland, February 2002
2001 Botha, R.A., Eloff, J.H.P. (2001), Fuzzy Access Control Decisions for Professional Collaborative Environments, GROUP2001, October 2001, USA
2001 Botha, R.A., Eloff, J.H.P. (2001), An access control architecture for XML documents in workflow environments, SAICSIT 2001, September 2001, South Africa
2001 Botha, R.A., Eloff, J.H.P. (2001), Designing role hierarchies for access control in workflow systems, COMPSAC2001, 8 -- 12 October 2001 in Chicago, USA
2001 E Smith, Eloff JHP, (2001), Transaction based Risk analysis - Using Cognitive Fuzzy techniques, 8th Annual Working Conference on Information Security Management & Small Systems Security, September 2001, Las Vegas, USA
2000 Cholewka, D.G. Botha, R.A., Eloff, J.H.P. (2000) A Context-sensitive Access Control Model and Prototype Implementation Information Security for Global Information Infrastructures (Proceedings of the sixteenth annual international conference on Information Security, August 22-24, 2000, Beijing, China) pp341-350
2000 Liebenberg, A., Eloff, J.H.P. (2000) MASS: Model for an Auditing Security System Information Security for Global Information Infrastructures (Proceedings of the sixteenth annual international conference on Information Security, August 22-24, 2000, Beijing, China) , pp 141 - 150
2000 Venter, H., Eloff, J.H.P. (2000) Network Security Health Checking Information Security for Global Information Infrastructures (Proceedings of the sixteenth annual international conference on Information Security, August 22-24, 2000, Beijing, China)
1999 Eloff, J.H.P., (1999) Designing and maintaining secure software systems Info Sec Africa 99 Conference Johannesburg, South Africa
1999 Eloff, J.H.P. (1999) Holistic view to information security comference SUN Johannesburg, South Africa
1999 Eloff, J.H.P. (1999) Web browsers and Information Security issues comference SUN Johannesburg, South Africa
1999 Eloff, J.H.P. von Solms, SH (1999) Information security - benchmarking Infosec 99 Johannesburg, South Africa
1999 Venter, H.S., Labuschagne, L., Eloff, J.H.P. (1999) Real-time risk analysis on the Internet: a prototype Information Security Management & Small Systems Security (Proceedings of the Seventh Annual Working Conference of WG 11.1 & WG 11.2 of Technical Committee 11 of IFIP; Amsterdam, The Netherlands) pp 11-28
1998 Botha, R.A., Eloff, J.H.P. (1998) A Security Interpretation of the Workflow Reference Model Information Security - Small Systems Security & Information Security Management - 2 (Proceedings of the sixth working conference of WG 11.1 & WG 11.2 of Technical Committee 11 of IFIP); Vienna, Budapest
1998 Eloff, J.H.P., (1998) Network Security: Understanding the Java Security Model Disaster Recovery and Information Security Conference, Midrand, South Africa
1998 Eloff, J.H.P. (1998) Firewall technology and Internet Security Information Security '98 Conference, Johannesburg, South Africa
1998 Eloff, J.H.P., (1998) Groupware and Information Security Special Interest Group for Information Security, Johannesburg, South Africa
1998 Smith, E., Eloff, J.H.P. (1998) Modeling risks in a health-care institution Proceedings of the IFIP TC11 14th International Conference on Information Security, IFIP/Sec '98, pp 592 - 601 Vienna, Budapest
1997 Botha, R.A., Eloff, J.H.P. (1997) Management Considerations for securing a distributed client-server infrastructure Information Security - from Small systems to management of secure infrastructures - 1 (Proceedings of the working conference of WG 11.1 & WG 11.2 of Technical Committee 11 of IFIP); Denmark
1997 Korner, R., Eloff, J.H.P. (1997) A methodology for accrediting a commercial distributed database Proceedings of the 13th International Conference on Computer Security IFIP/SEC '97, Yngström, L. & Carlson, J. (eds.) Denmark
1997 Kruger, R., Eloff, J.H.P. (1997) A common criteria framework for the evaluation of information technology systems security Proceedings of the 13th International Conference on Computer Security IFIP/SEC '97, Yngstrom, L. & Carlson, J. (eds.) Denmark
1996 Booysen, H.A.S., Eloff, J.H.P. (1996) Information Security Issues on Divisional or Departmental level Small System Security (Proceedings of the working conference of WG 11.2 of Technical Committee 11 of IFIP), pp 64 - 73 Samos, Greece
1996 Eloff, J.H.P. (1996) Information Security in Medical Information Systems HELINA '96, 2nd International Working Conference on Health Informatics in Africa, South Africa
1996 Labuschagne, L., Eloff, J.H.P. (1996) Activating dynamic countermeasures to reduce risk Proceedings of the 12th International Conference on Computer Security IFIP/SEC '96, Katsikas, S, Gritzalis, D. (eds.) Samos Greece
1996 Labuschagne, L., Eloff, J.H.P. (1996) The Secure Operation of a Small Commercial Business using the Internet Small System Security (Proceedings of the working conference of WG 11.2 of Technical Committee 11 of IFIP); pp 36-45 Samos Greece
1996 Peplar, I., Eloff, J.H.P. (1996) EDI-Information Security Issues Proceedings of AIC Conference
1995 Bauknecht, K., Eloff, J.H.P., Karagiannis, D., Teufel, S, (1995), Information Security Concepts in Computer Supported Co-operative Work, Database and Expert Systems Applications DEXA '95, Lecture notes in computer science, No. 978, Revell, N. & Min Tjao, A. (eds.), London, UK, Springer-Verlag
1995 Booysen, H.A.S., Eloff, J.H.P., (1995), A methodology for the development of secure application systems, Information Security - the Next Decade (Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec '95, May 1995, Cape Town, South Africa) Eloff, J.H.P., Von Solms, S.H. (eds.), Chapman & Hall, pp 255 - 269
1995 De Ru, W.G., Eloff, J.H.P., (1995), Reinforcing password authentication with typing biometrics, Information Security - the Next Decade (Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec '95, May 1995, Cape Town, South Africa), Eloff, J.H.P., Von Solms, S.H. (eds.), Chapman & Hall, pp 562 - 576
1995 Eloff, J.H.P., (1995), Information Security Research, Proceedings of the 7th Annual Computer Society of South Africa Conference, Johannesburg, South Africa
1995 Eloff, J.H.P., (1995), Implementing 3 critical procedures to identify, manage and minimise your organisation's I.T. security risk: How vulnerable is your information system, Proceedings of I.T. Security, Johannesburg, South Africa
1995 Eloff, J.H.P., (1995), Minimise the vulnerability of your organisation, Proceedings of Corporate Crime: I.T. Security Alert, Johannesburg, South Africa
1995 Eloff, J.H.P., (1995), Methodology for implementing information security in a large organisation, ISCOR Information Security Seminar, Pretoria, South Africa
1995 Labuschagne, I., Eloff, J.H.P. (1995), Object Orientation Analysis (OOA): A new approach that challenges traditional design of systems, Proceedings of the second Annual Object Orientation Conference, Johannesburg, South Africa
1995 Eloff, J.H.P., Labuschagne, L., (1995), Activating dynamic countermeasures to reduce risk, Proceedings of the 7th Annual Computer Society of South Africa Conference, Johannesburg, South Africa
1994 Booysen, H.A.S., Eloff, J.H.P., (1994), A Methodology for Secure Development of Application Systems, Proceedings of the 6th Annual Canadian Computer Security Symposium, Ottawa, Canada
1994 Eloff, J.H.P., (1994), An overview of Information Security research activities with special reference to the extension of CASE Technologies, Colloquium, Summer semester, Institut fur Informatik, University of Zurich, Zurich, Switzerland
1993 Booysen, H.A.S., De Ru, W.G., Eloff, J.H.P., (1993), New Technologies in Information Security, Proceedings of Information Security Seminar, Johannesburg, South Africa
1993 Booysen, H.A.S., De Ru, W.G., Eloff, J.H.P., (1993), New Technologies: Expert Systems and CASE, Proceedings of Computer Fraud and Counter Measures, Johannesburg, South Africa
1993 Bosch, C.J., Eloff, J.H.P., Carroll, J.M., (1993), International Standards and Organisation Security Needs: Bridging the gap, Proceedings of the IFIP TC11 9th international conference on information security, IFIP/SEC '93, Toronto, Canada
1993 De Ru, W.G., Eloff, J.H.P., (1993), Improved password mechanisms through expert system technology, 9th Annual Computer Security Applications Conference, Florida, USA
1993 Eloff, J.H.P., (1993), Information Security: What are the risks involved?, Proceedings of EIS: "The link with Management Information Systems", Johannesburg, South Africa
1993 Eloff, J.H.P., (1993), MethoDex: A framework for an Expert Systems Development Methodology, Proceedings of the 7th International Symposium on Methodologies for Intelligent Systems (ISMIS), Trondheim, Norway
1993 Eloff, J.H.P., Van Dyk, P., (1993), Information Security in Financial Institutions, Proceedings of the Banking Technology Seminar, Johannesburg, South Africa
1992 Badenhorst, K.P, Eloff, J.H.P., (1992), Information Risk Management: A Targeted approach, COMPSEC '92. The 9th World conference on computer security audit and control, London, London, UK
1992 Eloff, J.H.P., (1992), Computer Security Investigation in an Organisation, Management approaches to Information security in South Africa, Special Interest Group for Information Security, Johannesburg, South Africa
1992 Eloff, J.H.P., Klut J., (1992), MethoDex: A Methodology for expert system development, Expert '92, Pretoria, South Africa
1992 Eloff, J.H.P., Nel, A.J., (1992), A methodology for network security, IWACA, 92. International workshop on advanced communications and applications for High Speed Networks. Munich, Germany.
1991 Badenhorst, K.P., Eloff, J.H.P., (1991), Information risk assessment: risk analysis and risk management, Proceedings of COMPSEC '91. The 8th World conference on computer security audit and control, London, UK
1991 Badenhorst, K.P., Eloff, J.H.P., (1991), Information security risk analysis and risk management: Which approach?, Proceedings of 14th National Computer Security Conference , Washington D.C. USA
1991 Eloff, J.H.P., Eloff, M.M., (1991), Distance education in computer training, Proceedings of CISNA '91, Blantyre, Malawi
1991 Eloff, J.H.P., Marais, J.L., (1991), The implementation of Gadgets User Interface Management System, Proceedings of SAIEE '91, Johannesburg, South Africa
1991 Eloff, J.H.P., Nel, A.J., (1991), The role of network security in a Methodology for Information Security design and implementation, Proceedings of 14th National Computer Security Conference, Washington D.C. USA
1991 Eloff, J.H.P., Van Dyk, P., (1991), A customisable approach to personal computer security, Proceedings of CISNA '91, Blantyre, Malawi
1990 Badenhorst, K.P.& Eloff, J.H.P., (1990), Computer security methodology: risk analysis and project definition, Proceedings of INFOSEC '90, Pretoria, South Africa
1990 Eloff, J.H.P., Van Dyk, P., (1990), RAUSEC: A microcomputer security model, Proceedings of INFOSEC '90, Pretoria, South Africa
1989 Eloff, J.H.P., Eloff, M.M., (1989), A Methodology for the Management of End-user Computing, Proceedings of 5th South African Computer Congress, Johannesburg, South Africa
1985 Eloff, J.H.P., (1985) The Development of a Specification Language for a Computer Security System, Computer Security: the practical issues in a troubled world (Proceedings of the Third IFIP International Conference on Computer Security, IFIP/Sec '85, Dublin, Ireland, 12-15 August, 1985), Grimson, J.B. & Kugler, H.-J. (eds)
1984 Eloff, J.H.P., (1983) Selection Process for Security Packages Computer Security: a global challenge (Proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec '84, Toronto, Canada, 10-12 September, 1984), Finch, J.H. & Dougall, E.G. (eds)
1981 Eloff, J.H.P., (1981) Selection Process for Security Packages Proceedings of the 2nd South African Computer Symposium Pretoria, South Africa
  Return to Top