Research: Publications

Publications on network security

Publications are listed in reverse chronological order according to publication date. The publications listed on this page include all my publications from all listed areas of interests.

  • DLAMINI, M.; ELOFF, J.H.P.; ELOFF, M.M.; VENTER, H.S.; 2011; “A Cost Effective and Optimal Information Security Budget”; Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA); London, UK.

  • DLAMINI, M.; VENTER, H.S.; ELOFF, J.H.P.; ELOFF, M.M.; 2011; " Security of Cloud Computing: Seeing Through the Fog";  SATNAC: South African Telecommunication Networks & Applications Conference; East London Convention Centre, East London, South Africa.

  • GROBLER, M.; FLOWERDAY, S.; VON SOLMS, R.; VENTER H.S.;  "Cyber Awareness Initiatives in South Africa: A National Perspective"; First IFIP TC9/TC11 Southern African Cyber Security Awareness Workshop (SACSAW11);  Gaberone, Botswana; ISBN: 978-0-620-50050-0; pp 32-41.

  • ROSSODOWSKI, A.M.; VENTER, H.S.; ELOFF, J.H.P.; KOURIE, D.G; 2010; “A Security Privacy Aware Architecture and Protocol for a Single Smart Card used for Multiple Services”; Computers & Security; Vol. 29; pp. 393-409; Elsevier; ISSN 0167-4048.

  • VENTER, H.S.; ELOFF, J.H.P.; WOJCIK, M.; 2008; “Implementing Prejudice in Trust Models: A Prototype”;The 13th Nordic Workshop on Secure IT Systems; Copenhagen, Denmark.

  • GRANT, T.; VENTER, H.S.; ELOFF, J.H.P.; 2007; “Simulating adversarial interactions between intruders and system administrators using OODA-RR”; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Protea Hotel, Stellenbosch, South Africa; Fish River Sun, South Africa.

  • ROSSUDOWSKI, A.M.; VENTER, H.S.; ELOFF, J.H.P.; 2007; “Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis”; 22nd IFIPSEC Conference on New Approaches for Security, Privacy and Trust in Complex Environments; Sandton, South Africa.

  • ROSSUDOWSKI, A.M.; VENTER, H.S.; 2007; “Secure Remote User Authentication over an Unsecure Telecommunications Network”; 10th SATNAC: South African Telecommunication Networks & Applications Conference; Sugar Beach, Mauritius.

  • CROFT, N.J.; OLIVIER, M.S.; VENTER, H.S.; 2005; "Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks"; Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE SecPerU 2005); Santorini, Greece.

  • KELETA, Y.; COETZEE, M.; ELOFF, J.H.P, VENTER, H.S.; 2005 “Proposing a Secure XACML architecture ensuring privacy and trust”; ISSA: Information Security South Africa Proceedings; Sandton, South Africa.

  • WOJCIK, M.; VENTER, H.S.; ELOFF, J.H.P.; OLIVIER, M.S.; 2005; “Incorporating Prejudice into Trust Models to Reduce Network Overload”; SATNAC: South African Telecommunication Networks & Applications Conference; Champagne Sports Resort, Drakensberg, South Africa.

  • OYOMNO, W.; VENTER, H.S.; 2005; “Link Layer Type-Tagging in Fixed-Phrase Speaker Verification Systems”; SATNAC: South African Telecommunication Networks & Applications Conference; Champagne Sports Resort, Drakensberg, South Africa.

  • TSHIVHASE, F.E.; VENTER, H.S.; ELOFF, J.H.P; 2005; “Implementing Application and Network Security using Aspect-oriented Programming”; SATNAC: South African Telecommunication Networks & Applications Conference; Champagne Sports Resort, Drakensberg, South Africa.

  • ROSSUDOWSKI, A.M.; VENTER, H.S.; 2005; “The use of smart cards to perform ATM transactions in an off-line environment”; SATNAC: South African Telecommunication Networks & Applications Conference; Champagne Sports Resort, Drakensberg, South Africa.

  • KELETA, Y. G.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Protea Hotel, Stellenbosch, South Africa; “Web services security policy integration”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; Computers & Security; “A Taxonomy for Information Security Technologies”; Vol. 22, No. 4; pp. 299-307; Elsevier Science; ISSN 0167-4048.

  • VENTER, H.S.; ELOFF, J.H.P.; 2000; IFIP/SEC: Information Security for Global Information Infrastructures; “Network Security Health Checking”; ISBN 7-80003-466-6; pp. 287-220.

  • VENTER, H.S.; ELOFF, J.H.P.; 2000; Network Security; “Network Security: Important Issues”; Vol. 6 pp. 12-16; Elsevier Science;
    ISSN 1353-4858.

  • VENTER, H.S.; ELOFF, J.H.P.; 2000; IT Indaba, RAU, South Africa; “A Model for Network Reconfiguration”.

  • VENTER, H.S.; ELOFF, J.H.P.; 1999; Small Systems Information Security Management & Small Systems Security; “Real-time Risk Analysis on the Internet: A Prototype”; Kluwer Academic Publishers; ISBN 0-7923-8626-4; pp. 11-27.

  • VENTER, H.S.; ELOFF, J.H.P.; 1999; IT Indaba, RAU, South Africa; “Real-time Risk Analysis on the Internet”.

  • VENTER, H.S.; ELOFF, J.H.P.; 1998; Computers & Security; “Data Packet Intercepting on the Internet: How and Why?  A Closer Look at Existing Data Packet-intercepting Tools”; Vol. 17 no. 8; pp. 683-692; Elsevier Science; ISSN 0167-4048.

   
 
 

Maintained by Hein Venter
Last updated on 2012/01/24 09:41:11 AM