|
Research:
Publications
Publications on information privacy
Publications are listed in reverse
chronological order according to publication date. The publications listed on
this page include all my publications from all listed areas of interests.
-
OLIVIER, M.S.; ELOFF, J.H.P.;
VENTER, H.S.; 2011; BOTES, M.E.; "Using e-coins to ensure fair
sharing of donor funds amongst HIV healthcare facilities"; South African
Computer Journal; No. 47; pp.47-57; South African Institute of Computer
Scientists and Information Technologists; ISSN 1015-7999.
-
REDDY, K.; VENTER, H.S.;
2010; "Information Privacy in Two Dimensions - Towards a Classification
Scheme for Information Privacy Research"; 2010 IEEE Second International
Conference on Social Computing; Minneapolis, Minnesota, USA.
-
REDDY, K.; VENTER, H.S.;
2009; “Using Object-Oriented Concepts to Develop a High-Level Information
Privacy Risk Management Model”; The Third International Conference on
Emerging Security Information, Systems and Technologies (SECURWARE 2009);
Athens, Greece.
-
REDDY, K.; VENTER, H.S.,
M.S. OLIVIER, I. CURRIE; 2008; “Towards Privacy Taxonomy-Based Attack Tree
Analysis for the Protection of
Consumer Information Privacy”; Sixth Annual Conference on
Privacy, Security and Trust; Fredericton, New Brunswick, Canada.
-
REDDY, K.;
VENTER, H.S.; 2007; “Privacy Capability Maturity Models within
Telecommunications Organisations”; 10th SATNAC: South
African Telecommunication Networks & Applications Conference; Sugar
Beach, Mauritius.
-
TILLWICK,
H.; NEUMANN, T.; OLIVIER, M.S.; VENTER, H.S.; ELOFF, J.H.P.; 2005; Fifth International Network Conference (INC2005); “Polar: Proxies
Collaborating to Achieve Anonymous Web Browsing”; Doryssa Bay, Samos,
Greece.
-
VENTER, H.S.;
OLIVIER, M.S.; ELOFF, J.H.P.; BOTES, M.E.; 2005; Fifth International
Network Conference (INC2005); “Balancing Patient Privacy and Treatment
Facility Accountability using a Centralised Pseudonymous HIV/AIDS Database”;
Doryssa Bay, Samos, Greece.
-
CROFT,
N.J.; OLIVIER, M.S.; VENTER, H.S.; 2005; "Codec-Hopping: Secure and
Private Voice Communication in Bandwidth Constrained Networks"; Workshop
on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE
SecPerU 2005); Santorini, Greece.
-
KELETA, Y.;
COETZEE, M.; ELOFF, J.H.P, VENTER, H.S.; 2005 “Proposing a Secure
XACML architecture ensuring privacy and trust”; ISSA: Information
Security South Africa Proceedings; Sandton, South Africa.
-
VENTER, H.S.;
OLIVIER, M.S.; ELOFF, J.H.P.; 2004; Internet Research: Electronic
Networking Applications and Policy; “PIDS: A Privacy Intrusion Detection
System”; Vol. 14, No. 5; pp. 360-365; Emerald Group Publishing Limited;
ISSN: 1066-2243.
-
VENTER, H.S.;
OLIVIER, M. S.; ELOFF, J.H.P.; 2004; International Network Conference;
“PIDS: A Privacy Intrusion Detection System”; Plymouth, United Kingdom.
|