Consultation to Industry
Publications - Journals
Publications - Conferences
Download Journal Papers
Professional Activities
Membership
Home
e-mail: eloff@cs.up.ac.za
telephone number: (012) 999-9100
|
Prof. Jan Eloff
Papers Presented at Conferences
2010
|
Mtsweni, J., Ntuli, M. & Eloff J.H.P., 2010, Developing m-Services for Emerging Markets: a case of South Africa, 1st International Conference on Services in Emerging Markets, September 23-24, 2010, Indian School of Business, Gachibowli, Hyderabad, http://www.isb.edu/ICSEM2010/
|
2010
|
Veerasamy N., Eloff J.H.P., 2010, Motivation and Requirements for Determining a Network Warfare Capability in the proceedings of The European Conference on Information Warfare and Security hosted strategyinternational.org and the Department of Applied Informatics, University of Macedonia in Thessaloniki, Greece on the 1-2 July 2010.
|
2009
|
Dlamini, M.T., Eloff, M.M., Eloff, J.H.P. & Hone, K. 2009, BC3I - Towards requirements specification for preparing an Information Security budget, Proceedings of the ISSA 2009 Conference, Editors: Hein Venter, Marijke Coetzee and Les Labuschagne, pp 53 - 67, ISBN 978-1-86854-740-1, 6 - 8 July 2009, Johannesburg, South Africa
|
2009
|
Dlamini, M.T., Eloff, M.M. & Eloff, J.H.P. 2009, Internet of Things: Emerging and Future Scenarios from an Information Security Perspective, Proceedings of SATNAC 2009: Convergence - 21st Century Lifestyle Enabler, 31 August - 2 September 2009. Royal Swazi Spa, Ezulwini, Swaziland.
|
2009
|
Eloff, J.H.P., Eloff, M.M., Dlamini, M.T. & Zielinski M.P., 2009, Internet of People, Things and Services - The Convergence of Security, Trust and Privacy, 3rd Annual CompanionAble Consortium Workshop - IoPTS, (Internet of People, Things and Services) 02 December 2009, Novotel Brussels - Brussels, Online proceedings available at http://www.companionable.net/index.php?option=com_phocadownload&view=category&id=7:3rd-companionable-workshop-iopts-proceedings&Itemid=6
|
2009
|
Martim E., Dlamini, M., Van Greunen D., Eloff J.H.P., Herselman M., 2009, Is Buying and Transacting Online Easier and Safer than Down Town? : An Emerging Economy Perspective accepted at the 4th International Conference on Information Warfare and Security, Breakwater Lodge, Cape Town, South Africa on the 26-27 March 2009.
|
2008
|
Venter H.S., Eloff J.H.P., Wojcik M, 2008, Implementing Prejudice in Trust Models: A Prototype, in Proceedings of The 13th Nordic Workshop on Secure IT Systems, 9-10 October, 2008, Copenhagen, Denmark
|
2008
|
Adigun, E.A., Eloff J.H.P., 2008, Implementing a Trusted Service-Oriented Network Environment, in Proceedings of the SATNAC 2008 Conference, 7 . 10 September 2008, Wild Coast Sun, Eastern Cape Coast, South Africa
|
2008
|
Veerasamy N. Eloff J.H.P., 2008, The Application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment: CESSE 2008 (International Conference on Computer, Electrical, and Systems Science, and Engineering -France)
|
2008
|
Kohn, M., Eloff J.H.P., Olivier, M., 2008, UML Modeling of Digital Forensic Process Models (DFPMs) in Venter H.S., Eloff, M.M., Eloff, J.H.P. and Labuschagne L, (Editors) (2008), Proceedings of the ISSA 2008 Innovative Minds Conference, 7 . 9 July 2008 School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, ISBN 978-1-86854-693-0, pp 149-162
|
2008
|
Veerasamy N. Eloff J.H.P., 2008, Towards a Framework for a Network Warfare Capability in Venter H.S., Eloff, M.M., Eloff, J.H.P. and Labuschagne L, (Editors) (2008), Proceedings of the ISSA 2008 Innovative Minds Conference, 7 . 9 July 2008 School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, ISBN 978-1-86854-693-0, pp 405-422
|
2008
|
Arthur, KK. Olivier, MS. Venter, HS. Eloff, JHP. 2008, Considerations Towards a Cyber Crime Profiling System, in S Jakoubi, S Tjoa and ER Weippl, Proceedings of AReS 2008 - The Third International Conference on Availability, Security and Reliability, 1388-1393, IEEE, 2008
|
2007
|
Veerasamy N. Eloff J.H.P., 2007, Framework for the Establishment of a Honeynet, in Proceedings of the SATNAC 2007 Conference, 10 . 13 September 2007, Sugar Beach Resort, Mauritius
|
2007 |
Coetzee, M., Eloff J.H.P., 2007, A trust and context aware access control model for web services conversations, accepted for publication in Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus`07). September 3 - 7, 2007, Regensburg, Germany. |
2007 |
Padayachee, K., Eloff J.H.P., 2007, Enhancing Optimistic Access Controls with Usage Control, accepted for publication in Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus`07). September 3 - 7, 2007, Regensburg, Germany |
2007 |
Veerasamy N. Eloff J.H.P., 2007, Framework for the Establishment of a Honeynet, accepted for publication in Proceedings of the SATNAC 2007 Conference, 10 - 13 September 2007, Sugar Beach Resort, Mauritius |
2007 |
Adigun, E.A., Eloff J.H.P., 2007, Defining a Trusted Service-Oriented Network Environment, in Proceedings of Second International Conference on Availability, Reliability and Security (ARES 2007 - The International Dependability Conference) Vienna 10-13 April 2007
|
2007 |
Rossudowski, A.M., Venter, H.S., Eloff J.H.P., 2007, Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis, in New Approaches for Security, Privacy and Trust in Complex Environments, Series: IFIP International Federation for Information Processing, 14-16 May 2007, Sandton, South Africa.
|
2006 |
Adigun, E.A., Lutu, P.E.N., Eloff J.H.P., 2006, Mobile and Wireless Technology: Making a World of Difference, in Bytheway A & Strümpfer C (eds), Proceedings: Community Informatics for Developing Countries, ISBN 0-620-37058-0, 31 Aug-2 Sept 2006, Cape Town, South Africa.
|
2006 |
Coetzee, M., Eloff, J.H.P., 2006, A Framework for Web Services Trust. 2006. in Proceedings of the 21st International Information Security Conference (SEC 2006), Security and Privacy in Dynamic Environments. Series: IFIP International Federation for Information Processing, Vol 201 Fischer-Hübner, S.; Rannenberg, K.; Yngström, L.; Lindskog, S. (Eds.) Springer, 2006, XVI, 494 p., Hardcover ISBN: 0-387-33405-X, 22-24 May 2006, Karlstad, Sweden.
|
2006 |
Fei, B.K.L., Eloff, J.H.P., Olivier, M.S., Venter, H.S., 2006, Network Forensics: Web Proxy Log Analysis. Proceedings of the Second Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January/February 2006.
|
2006 |
Kohn, M., Olivier, M., Eloff J.H.P., 2006, Framework for a Digital Forensic Investigation, in H.S Venter, J.H.P. Eloff, L. Labuschagne and M.M. Eloff (eds), Proceedings of the 6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference, July 2006, South Africa, ISBN 1-86854-636-5.
|
2006 |
McManus, L., Eloff J.H.P., 2006, Using IT Benchmarking Principles to Design an Information Security Benchmark Model, in H.S. Venter, J.H.P. Eloff, L. Labuschagne and M.M. Eloff (eds), Proceedings of the 6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference, July 2006, South Africa, ISBN 1-86854-636-5.
|
2006 |
Padayachee, K., Eloff J.H.P., 2006 The Next Challenge: Aspect-Oriented Programming, in Proceedings of IASTED, The Sixth IASTED International Conference on Modelling, Simulation, and Optimilzation, ~MSO 2006~ September 11-13, 2006 Gabarone, Botswana.
|
2006 |
Padayachee, K., Eloff J.H.P., 2006, An Aspect-Oriented Model to Monitor Misuse, Proceedings of The International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE) 2006 , December 4 - 14, 2006, University of Bridgeport, USA.
|
2006 |
Padayachee, K., Eloff J.H.P., 2006, Aspect-Oriented Mandatory Access Control, In: Judith Bishop, Derrick Kourie (eds), Proceedings of the annual South African Institute of Computer Scientists and Information Technologists Conference (SAICSIT) Service-oriented Software and Systems, South Africa, ISBN: 1-59593-567-3, 9-11 October 2006, Somerset West, South Africa.
|
2006 |
Wojcik, M., Venter, H.S., Eloff, J.H.P., 2006, Trust Model Evaluation Criteria: A Detailed Analysis of Trust Representation, Proceedings of The Next Generation Services, the Network @ Work, Southern African Telecommunications Networks and Applications Conference (SATNAC) 2006, ISBN: 0-620-37043-2, 3 - 6 September 2006, Western Cape, South Africa.
|
2006 |
Wojcik, M., Venter, H.S., Eloff, J.H.P., 2006, Trust Model Evaluation Criteria: A Detailed Analysis of Trust, in H.S. Venter, J.H.P. Eloff, L. Labuschagne and M.M. Eloff (eds), Proceedings of the 6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference, July 2006, South Africa, ISBN 1-86854-636-5.
|
2005 |
Loock, M, Eloff, JHP, (2005) A new Access Control model based on the Chinese Wall Security Policy Model , Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
|
2005 |
Laubscher, R, Rabe, DJ, Olivier, M, Eloff, JHP & Venter, HS, (2005) Applying computer forensic principles in evidence collection and analysis for a computer-based programming assessment Proceedings of IFIP WG 11.9 First International Conference on Digital Forensics, February 13-16, 2005, Orlando, Florida
|
2005 |
Fei, BKL, Eloff, JHP, Venter, HS & Olivier, M, (2005) Exploring Data generated by Computer Forensic Tools with Self-Organizing Maps Proceedings of IFIP WG 11.9 First International Conference on Digital Forensics, February 13-16, 2005 Orlando, Florida
|
2005 |
Fei, BKL, Eloff, JHP, Venter, HS & Olivier, M, (2005) Exploring Data generated by Computer Forensic Tools with Self-Organizing Maps Proceedings of IFIP WG 11.9 First International Conference on Digital Forensics, February 13-16, 2005 Orlando, Florida
|
2005 |
Coetzee, M, Eloff, JHP, (2005), Metadata for trust in service-oriented architectures, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
|
2005 |
Loock M Eloff, JHP, Investigating the usage of the Chinese Wall Security Policy model for Data Mining, Proceedings of the 4th International Symposium on Information and Communication Technology, 3-6 January 2005, Cape Town, South Africa
|
2005 |
Bihina, M, Eloff, JHP, Olivier, MS, (2005) Using the IPDR standard for NGN billing and fraud detection, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
|
2005 |
Fei, BKL, Tillwick, H, Eloff, JHP, Venter HS, and Olivier, MS, (2005), Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
|
2005 |
Keleta, Y, Coetzee, M., Eloff, JHP, Venter, HS, (2005), Proposing a Secure XACML architecture ensuring privacy and trust, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
|
2005 |
Laubscher, R, Rabe, DJ, Olivier, MS, Eloff JHP, Venter, HS, (2005), Computer forensics for a computer-based assessment: the preparation phase, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
|
2005 |
Laubscher, R, Rabe, C, Olivier, M, Venter, HS, Eloff, JHP, (2005), The Role of Key loggers in Computer-based Assessment Forensics, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists Conference (SAICSIT), September 2005, White River, South Africa
|
2005 |
Tshivhase, FE, Venter, HS, Eloff, JHP, (2005), Implementing Application and Network Security Using Aspect-oriented Programming, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2005, 12-14 September 2005, Drakensberg, South Africa, ISBN 0-620-34908-5
|
2005 |
Fei, BKL, Venter, HS, Olivier, MS, Eloff, JHP, (2005), Using Computer Forensic Tools and Self-Organising Maps for Detecting Anomalous Behaviours, The 17th Meeting of the International Association of Forensic Sciences (IAFS 2005), 21-26 August 2005, Hong Kong Convention and Exhibition Centre, Hong Kong
|
2005 |
Wojcik, M, Venter, HS, Eloff, JHP, Olivier, MS, (2005), Incorporating Prejudice into Trust Models to Reduce Network Overload, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2005, 12-14 September 2005, Drakensberg, South Africa, ISBN 0-620-34908-5
|
2005 |
Bihina Bella, M, Olivier, MS, Eloff, JHP, (2005), A fraud detection model for Next Generation Networks, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2005, 12-14 September 2005, Drakensberg, South Africa, ISBN 0-620-34908-5
|
2005 |
Venter, HS, Olivier, MS, Eloff, JHP, Botes, ME, Bayard, R, Nunes, R, (2005), Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database, Proceedings of the Fifth International Network Conference (INC 2005). pp. 327-386 ISBN 960-7475-32-1, 5-7 July 2005, Samos Greece.
|
2005 |
Coetzee, M, Eloff, JHP, (2005), Autonomous Trust for Web Services, Proceedings of the Fifth International Network Conference (INC 2005). pp. 217-226. ISBN 960-7475-32-1, 5-7 July 2005, Samos Greece.
|
2005 |
Izadinia, VD, Eloff, JHP, Kourie, D, (2005) Foiling an Attack ? Defeating IPSec Tunnel Fingerprinting, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X, Johannesburg, South Africa
|
2004 |
Tillwick, H, Neumann, T, Olivier, MS, Venter, HS, Eloff, JHP, (2005), Polar: Proxies collaborating to achieve anonymous webbrowsing, Proceedings of the Fifth International Network Conference (INC 2005). pp. 317 - 324. ISBN 960-7475-32-1, 5-7 July 2005, Samos Greece.
|
2004 |
Bihina Bella, M, Eloff, JHP, (2004) Requirements for Next-Generation networks billing systems, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2004, 6-8 September 2004, Spier Wine Estate, South Western Cape, South Africa
|
2004 |
Pillai MM, Eloff, JHP, Venter, HS, (2004), An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), October 2004, Stellenbosch, SA, Unisa Press, 1-58113-982-9
|
2004 |
Coetzee, M, Eloff, JHP, (2004) Access control for service-oriented computing, Proceedings of the Southern African Telecommunication Networks & Applications (SATNAC) Conference 2004, 6-8 September 2004, Spier Wine Estate, South Western Cape, South Africa |
2004 |
Morkel, T, Eloff, JHP (2003) Encryption Techniques: A Timeline Approach, Proceedings of the Research in Progress at the 4th Annual International Information Security South Africa (ISSA) conference, July 2004
|
2004 |
Keleta YG, Eloff, JHP, (2004) Web services security policy integration, Proceedings of the annual Post Graduate Symposium of the South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), October 2004, Stellenbosch, SA, Unisa Press
|
2004 |
Fei, BKL, Eloff, JHP, Venter, HS, and Olivier, MS (2004), Classifying Computer Forensic Tools with the Aim of Extending the Functionality of EnCase, Proceedings of the annual Post Graduate Symposium of the South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), October 2004, Stellenbosch, SA, Unisa Press
|
2004 |
Venter, HS, Olivier, MS, Eloff, JHP, (2004) PIDS: A Privacy Intrusion Detection System, Proceedings of INC2004, Fourth International Network Conference, 5 - 7 July, Plymouth, UK
|
2004 |
Granova A, Eloff, JHP (2004) South African Online Banking: Who Carries The Risk? Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
|
2004 |
Li Y, Venter, HS, Eloff, JHP, (2004) Categorizing vulnerabilities using data clustering techniques, Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
|
2004 |
Eloff, MM, Kotzé P, Adesina-Ojo A, Eloff JHP, (2004), Accessible Computer Interaction for People with Disabilities - the Case of Quadriplegics, 6th International Conference on Enterprise Information Systems, Porto, Portugal, 14 - 17 April 2004
|
2004 |
Coetzee M, Eloff, JHP, (2004) A Logic-Based Access Control Approach for Web Services, Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
|
2004 |
Coetzee M, Eloff, JHP, (2004) Access control for networked Web Services, Proceedings of INC2004, Fourth International Network Conference, 5 - 7 July, Plymouth, UK
|
2003 |
Eloff, JHP (2003) State of the Art Vulnerability Detection and Suggestions for improvement, International Conference on Information and Communication Technology, 30 November - 2 December 2003, Cairo, Egypt
|
2003 |
Venter, HS, Eloff, JHP (2003), State of the art intrusion detection and vulnerability scanning, Proceedings of the annual Post Graduate Symposium of the South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), September 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-58113-774-5
|
2003 |
Venter, HS, Eloff, JHP (2003) Vulnerability Detection, Proceedings of the Annual International Information Security South Africa (ISSA) conference, July 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-86854-485-0, pp 89-98
|
2003 |
Eloff, JHP, Eloff, MM, (2003), Information Security Management - A New Paradigm, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), September 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-58113-774-5, pp130-136
|
2003 |
Eloff, MM, Eloff, JHP, (2003), Information Security Management System: processes and products Proceedings of IFIP SEC 2003, May 2003, Athens, Greece
|
2003 |
Coetzee M, Eloff, JHP (2003) Virtual enterprise control requirements, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), September 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-58113-774-5, pp. 285-294
|
2003 |
Coetzee M, Eloff, JHP (2003) Access Control for Web Services, Proceedings of the Annual International Information Security South Africa (ISSA) conference, July 2003, Johannesburg, SA, Unisa Press, 2003, ISBN 1-86854-485-0 pp 99-112
|
2002
|
M Loock, JHP Eloff, 2002, Information Security Issues in Data Mining, Proceedings of SAICSIT, September 2002, Port Elizabeth, South Africa
|
2002
|
Hein Venter JHP Eloff, 2002, Enabling Businesses To Evaluate Intrusion Detection Tools, Proceedings of SAICSIT, September 2002, Port Elizabeth, South Africa
|
2002
|
JHP Eloff , SH von Solms, (2002) An Architecture For Information Security Management, IFIP Congress 2002, 17TH World Computer Congress, August 2002, Montreal, Canada
|
2002
|
JHP Eloff, (2002) Implementing an IT Security Infrastructure to fulfill your Organizational Objectives, Lisho Conference, September 2002, Randburg, South Africa
|
2002
|
K Hone, JHP Eloff, 2002, Information Security Policy - What do International Information Security Standards say?, Proceedings of ISSA2002, July 2002, Johannesburg, South Africa
|
2002
|
A Martins, JHP Eloff, 2002, Promoting information security culture through an information security culture model, Proceedings of ISSA2002,July 2002, Johannesburg, South Africa
|
2002
|
L Robbertze, JHP Eloff, 2002, Information Security Implementation Methodologies, Proceedings of ISSA2002, July 2002, Johannesburg, South Africa
|
2002
|
M Loock, JHP Eloff, 2002, Information Security Issues in Data Mining, Proceedings of ISSA2002, July 2002, Johannesburg, South Africa
|
2002
|
Hein Venter JHP Eloff, 2002, Generic Vulnerability Categories, Proceedings of ISSA2002, July 2002, Johannesburg, South Africa
|
2002
|
M Coetzee, JHP Eloff, 2002, Secure Database Connectivity On The WWW, Proceedings of ISSA2002
|
2002
|
M Coetzee, JHP Eloff, 2002, Secure Virtual Web Databases for an e-commerce Environment, Proceedings of IFIP SEC 2002, May 2002, Cairo, Egypt
|
2002
|
A Martins, JHP Eloff, 2002, Information Security Culture, Proceedings of IFIP SEC 2002, May 2002, Cairo, Egypt
|
2002
|
Eloff, M.M., Eloff J.H.P., (2002), Secure Human Computer Interaction: an Information Security Perspective, Proceedings of IFIP SEC 2002, May 2002, Cairo, Egypt,
|
2002
|
Eloff J.H.P., (2002), Information Management Architecture - an overview Information Security Architectures Workshop, Fribourg, Switzerland, February 2002
|
2002
|
Eloff J.H.P., (2002), Tactical level - an overview of the latest trends in risk analysis, certification, best practices and international standards Information Security Architectures Workshop, Fribourg, Switzerland, February 2002
|
2002
|
Eloff J.H.P., (2002), How to develop an Information Security Policy Information Security Architectures Workshop, Fribourg, Switzerland, February 2002
|
2001
|
Botha, R.A., Eloff, J.H.P. (2001), Fuzzy Access Control Decisions for Professional Collaborative Environments, GROUP2001, October 2001, USA
|
2001
|
Botha, R.A., Eloff, J.H.P. (2001), An access control architecture for XML documents in workflow environments, SAICSIT 2001, September 2001, South Africa
|
2001
|
Botha, R.A., Eloff, J.H.P. (2001), Designing role hierarchies for access control in workflow systems, COMPSAC2001, 8 -- 12 October 2001 in Chicago, USA
|
2001
|
E Smith, Eloff JHP, (2001), Transaction based Risk analysis - Using Cognitive Fuzzy techniques, 8th Annual Working Conference on Information Security Management & Small Systems Security, September 2001, Las Vegas, USA
|
2000
|
Cholewka, D.G. Botha, R.A., Eloff, J.H.P. (2000) A Context-sensitive Access Control Model and Prototype Implementation Information Security for Global Information Infrastructures (Proceedings of the sixteenth annual international conference on Information Security, August 22-24, 2000, Beijing, China) pp341-350
|
2000
|
Liebenberg, A., Eloff, J.H.P. (2000) MASS: Model for an Auditing Security System Information Security for Global Information Infrastructures (Proceedings of the sixteenth annual international conference on Information Security, August 22-24, 2000, Beijing, China) , pp 141 - 150
|
2000
|
Venter, H., Eloff, J.H.P. (2000) Network Security Health Checking Information Security for Global Information Infrastructures (Proceedings of the sixteenth annual international conference on Information Security, August 22-24, 2000, Beijing, China)
|
1999
|
Eloff, J.H.P., (1999) Designing and maintaining secure software systems Info Sec Africa 99 Conference Johannesburg, South Africa
|
1999
|
Eloff, J.H.P. (1999) Holistic view to information security comference SUN Johannesburg, South Africa
|
1999
|
Eloff, J.H.P. (1999) Web browsers and Information Security issues comference SUN Johannesburg, South Africa
|
1999
|
Eloff, J.H.P. von Solms, SH (1999) Information security - benchmarking Infosec 99 Johannesburg, South Africa
|
1999
|
Venter, H.S., Labuschagne, L., Eloff, J.H.P. (1999) Real-time risk analysis on the Internet: a prototype Information Security Management & Small Systems Security (Proceedings of the Seventh Annual Working Conference of WG 11.1 & WG 11.2 of Technical Committee 11 of IFIP; Amsterdam, The Netherlands) pp 11-28
|
1998
|
Botha, R.A., Eloff, J.H.P. (1998) A Security Interpretation of the Workflow Reference Model Information Security - Small Systems Security & Information Security Management - 2 (Proceedings of the sixth working conference of WG 11.1 & WG 11.2 of Technical Committee 11 of IFIP); Vienna, Budapest
|
1998
|
Eloff, J.H.P., (1998) Network Security: Understanding the Java Security Model Disaster Recovery and Information Security Conference, Midrand, South Africa
|
1998
|
Eloff, J.H.P. (1998) Firewall technology and Internet Security Information Security '98 Conference, Johannesburg, South Africa
|
1998
|
Eloff, J.H.P., (1998) Groupware and Information Security Special Interest Group for Information Security, Johannesburg, South Africa
|
1998
|
Smith, E., Eloff, J.H.P. (1998) Modeling risks in a health-care institution Proceedings of the IFIP TC11 14th International Conference on Information Security, IFIP/Sec '98, pp 592 - 601 Vienna, Budapest
|
1997
|
Botha, R.A., Eloff, J.H.P. (1997) Management Considerations for securing a distributed client-server infrastructure Information Security - from Small systems to management of secure infrastructures - 1 (Proceedings of the working conference of WG 11.1 & WG 11.2 of Technical Committee 11 of IFIP); Denmark
|
1997
|
Korner, R., Eloff, J.H.P. (1997) A methodology for accrediting a commercial distributed database Proceedings of the 13th International Conference on Computer Security IFIP/SEC '97, Yngström, L. & Carlson, J. (eds.) Denmark
|
1997
|
Kruger, R., Eloff, J.H.P. (1997) A common criteria framework for the evaluation of information technology systems security Proceedings of the 13th International Conference on Computer Security IFIP/SEC '97, Yngstrom, L. & Carlson, J. (eds.) Denmark
|
1996
|
Booysen, H.A.S., Eloff, J.H.P. (1996) Information Security Issues on Divisional or Departmental level Small System Security (Proceedings of the working conference of WG 11.2 of Technical Committee 11 of IFIP), pp 64 - 73 Samos, Greece
|
1996
|
Eloff, J.H.P. (1996) Information Security in Medical Information Systems HELINA '96, 2nd International Working Conference on Health Informatics in Africa, South Africa
|
1996
|
Labuschagne, L., Eloff, J.H.P. (1996) Activating dynamic countermeasures to reduce risk Proceedings of the 12th International Conference on Computer Security IFIP/SEC '96, Katsikas, S, Gritzalis, D. (eds.) Samos Greece
|
1996
|
Labuschagne, L., Eloff, J.H.P. (1996) The Secure Operation of a Small Commercial Business using the Internet Small System Security (Proceedings of the working conference of WG 11.2 of Technical Committee 11 of IFIP); pp 36-45 Samos Greece
|
1996
|
Peplar, I., Eloff, J.H.P. (1996) EDI-Information Security Issues Proceedings of AIC Conference
|
1995
|
Bauknecht, K., Eloff, J.H.P., Karagiannis, D., Teufel, S, (1995), Information Security Concepts in Computer Supported Co-operative Work, Database and Expert Systems Applications DEXA '95, Lecture notes in computer science, No. 978, Revell, N. & Min Tjao, A. (eds.), London, UK, Springer-Verlag
|
1995
|
Booysen, H.A.S., Eloff, J.H.P., (1995), A methodology for the development of secure application systems, Information Security - the Next Decade (Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec '95, May 1995, Cape Town, South Africa) Eloff, J.H.P., Von Solms, S.H. (eds.), Chapman & Hall, pp 255 - 269
|
1995
|
De Ru, W.G., Eloff, J.H.P., (1995), Reinforcing password authentication with typing biometrics, Information Security - the Next Decade (Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec '95, May 1995, Cape Town, South Africa), Eloff, J.H.P., Von Solms, S.H. (eds.), Chapman & Hall, pp 562 - 576
|
1995
|
Eloff, J.H.P., (1995), Information Security Research, Proceedings of the 7th Annual Computer Society of South Africa Conference, Johannesburg, South Africa
|
1995
|
Eloff, J.H.P., (1995), Implementing 3 critical procedures to identify, manage and minimise your organisation's I.T. security risk: How vulnerable is your information system, Proceedings of I.T. Security, Johannesburg, South Africa
|
1995
|
Eloff, J.H.P., (1995), Minimise the vulnerability of your organisation, Proceedings of Corporate Crime: I.T. Security Alert, Johannesburg, South Africa
|
1995
|
Eloff, J.H.P., (1995), Methodology for implementing information security in a large organisation, ISCOR Information Security Seminar, Pretoria, South Africa
|
1995
|
Labuschagne, I., Eloff, J.H.P. (1995), Object Orientation Analysis (OOA): A new approach that challenges traditional design of systems, Proceedings of the second Annual Object Orientation Conference, Johannesburg, South Africa
|
1995
|
Eloff, J.H.P., Labuschagne, L., (1995), Activating dynamic countermeasures to reduce risk, Proceedings of the 7th Annual Computer Society of South Africa Conference, Johannesburg, South Africa
|
1994
|
Booysen, H.A.S., Eloff, J.H.P., (1994), A Methodology for Secure Development of Application Systems, Proceedings of the 6th Annual Canadian Computer Security Symposium, Ottawa, Canada
|
1994
|
Eloff, J.H.P., (1994), An overview of Information Security research activities with special reference to the extension of CASE Technologies, Colloquium, Summer semester, Institut fur Informatik, University of Zurich, Zurich, Switzerland
|
1993
|
Booysen, H.A.S., De Ru, W.G., Eloff, J.H.P., (1993), New Technologies in Information Security, Proceedings of Information Security Seminar, Johannesburg, South Africa
|
1993
|
Booysen, H.A.S., De Ru, W.G., Eloff, J.H.P., (1993), New Technologies: Expert Systems and CASE, Proceedings of Computer Fraud and Counter Measures, Johannesburg, South Africa
|
1993
|
Bosch, C.J., Eloff, J.H.P., Carroll, J.M., (1993), International Standards and Organisation Security Needs: Bridging the gap, Proceedings of the IFIP TC11 9th international conference on information security, IFIP/SEC '93, Toronto, Canada
|
1993
|
De Ru, W.G., Eloff, J.H.P., (1993), Improved password mechanisms through expert system technology, 9th Annual Computer Security Applications Conference, Florida, USA
|
1993
|
Eloff, J.H.P., (1993), Information Security: What are the risks involved?, Proceedings of EIS: "The link with Management Information Systems", Johannesburg, South Africa
|
1993
|
Eloff, J.H.P., (1993), MethoDex: A framework for an Expert Systems Development Methodology, Proceedings of the 7th International Symposium on Methodologies for Intelligent Systems (ISMIS), Trondheim, Norway
|
1993
|
Eloff, J.H.P., Van Dyk, P., (1993), Information Security in Financial Institutions, Proceedings of the Banking Technology Seminar, Johannesburg, South Africa
|
1992
|
Badenhorst, K.P, Eloff, J.H.P., (1992), Information Risk Management: A Targeted approach, COMPSEC '92. The 9th World conference on computer security audit and control, London, London, UK
|
1992
|
Eloff, J.H.P., (1992), Computer Security Investigation in an Organisation, Management approaches to Information security in South Africa, Special Interest Group for Information Security, Johannesburg, South Africa
|
1992
|
Eloff, J.H.P., Klut J., (1992), MethoDex: A Methodology for expert system development, Expert '92, Pretoria, South Africa
|
1992
|
Eloff, J.H.P., Nel, A.J., (1992), A methodology for network security, IWACA, 92. International workshop on advanced communications and applications for High Speed Networks. Munich, Germany.
|
1991
|
Badenhorst, K.P., Eloff, J.H.P., (1991), Information risk assessment: risk analysis and risk management, Proceedings of COMPSEC '91. The 8th World conference on computer security audit and control, London, UK
|
1991
|
Badenhorst, K.P., Eloff, J.H.P., (1991), Information security risk analysis and risk management: Which approach?, Proceedings of 14th National Computer Security Conference , Washington D.C. USA
|
1991
|
Eloff, J.H.P., Eloff, M.M., (1991), Distance education in computer training, Proceedings of CISNA '91, Blantyre, Malawi
|
1991
|
Eloff, J.H.P., Marais, J.L., (1991), The implementation of Gadgets User Interface Management System, Proceedings of SAIEE '91, Johannesburg, South Africa
|
1991
|
Eloff, J.H.P., Nel, A.J., (1991), The role of network security in a Methodology for Information Security design and implementation, Proceedings of 14th National Computer Security Conference, Washington D.C. USA
|
1991
|
Eloff, J.H.P., Van Dyk, P., (1991), A customisable approach to personal computer security, Proceedings of CISNA '91, Blantyre, Malawi
|
1990
|
Badenhorst, K.P.& Eloff, J.H.P., (1990), Computer security methodology: risk analysis and project definition, Proceedings of INFOSEC '90, Pretoria, South Africa
|
1990
|
Eloff, J.H.P., Van Dyk, P., (1990), RAUSEC: A microcomputer security model, Proceedings of INFOSEC '90, Pretoria, South Africa
|
1989
|
Eloff, J.H.P., Eloff, M.M., (1989), A Methodology for the Management of End-user Computing, Proceedings of 5th South African Computer Congress, Johannesburg, South Africa
|
1985
|
Eloff, J.H.P., (1985) The Development of a Specification Language for a Computer Security System, Computer Security: the practical issues in a troubled world (Proceedings of the Third IFIP International Conference on Computer Security, IFIP/Sec '85, Dublin, Ireland, 12-15 August, 1985), Grimson, J.B. & Kugler, H.-J. (eds)
|
1984
|
Eloff, J.H.P., (1983) Selection Process for Security Packages Computer Security: a global challenge (Proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec '84, Toronto, Canada, 10-12 September, 1984), Finch, J.H. & Dougall, E.G. (eds)
|
1981
|
Eloff, J.H.P., (1981) Selection Process for Security Packages Proceedings of the 2nd South African Computer Symposium Pretoria, South Africa
|
|
Return to Top |
|