![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
5th ISSA 2005: Sandton, South Africa
- Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa. ISSA, Pretoria, South Africa 2005, ISBN 1-86854-625-X - Job Asheri Chaula, Louise Yngström, Stewart Kowalski:
A Framework for Evaluation of Information Systems Security. 1-11 - Werner Bornman, Les Labuschagne:
A Framework for Information Security Risk Management Communication. 1-11 - Johan Van Niekerk, Rossouw von Solms:
A holistic framework for the fostering of an information security sub-culture in organizations. 1-13 - Marianne Loock, Jan H. P. Eloff:
A new Access Control model based on the Chinese Wall Security Policy Model. 1-10 - Eduardo Da Cruz, Les Labuschagne:
A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective. 1-12 - Carl Marnewick, Les Labuschagne:
A security framework for an ERP system. 1-15 - M. Jansen:
Access to copyrighted work: right or privelege? 1-11 - Norman Tinyiko Baloyi:
Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical. 1-12 - Charles N. Tarimo, Louise Yngström, Stewart Kowalski:
An approach to enhance the security of ICT infrastructure through legal, regulatory influences. 1-12 - S. A. Mlangeni, E. Biermann:
An assessment of Information Security Policies within the Polokwane area: A case study. 1-9 - Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier:
An overview of image steganography. 1-11 - Marco Slaviero, Jaco Kroon, Martin S. Olivier:
Attacking Signed Binaries. 1-10 - Shingo Okamura, Maki Yoshida, Toru Fujiwara:
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors. 1-12 - Emile Parkin:
Cryptographic Key Management principles applied in South African Internet Banking. 1-12 - Dennis Longley, Mark Branagan:
Developing Threat Networks for Risk Analysis of Information Systems. 1-10 - Pieter Blaauw:
Fighting spam in a corporate environment using open-source solutions - a case study. 1-11 - Vafa D. Izadinia, Jan H. P. Eloff, Derrick G. Kourie:
Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. 1-14 - Thomas Schlienger, Stephanie Teufel, Raphael Rues:
Information Security Culture - Status Quo in Switzerland. ISSA 2005 - Tite Tuyikeze, Dalenca Pottas:
Information Security Management and Regulatory Compliance in the South African Health Sector. 1-12 - Christoff Breytenbach:
Introduction to Assessing and Securing Web Services. 1-14 - Fabio Ghioni:
Invasion of the RFIDs: are we heading towards "Modern Times"? 1-5 - Johann Hershensohn:
IT Forensics: the collection of and presentation of digital evidence. 1-14 - Hennie A. Kruger, Wayne D. Kearney:
Measuring Information Security Awareness - A West Africa Gold Mining Environment Case. 1-10 - William List, David Brewer:
Measuring the effectivness of an internal control system. 1-13 - Marijke Coetzee, Jan H. P. Eloff:
Metadata for trust in service-oriented architectures. 1-12 - Alapan Arnab, Andrew Hutchison:
Requirement Analysis of Enterprise DRM Systems. 1-14 - Jacobus A. Ophoff, Reinhardt A. Botha:
Revisiting Reachability Management as a Multilateral Security Mechanism. 1-12 - Evangelos D. Frangopoulos, Lucas M. Venter, Mariki M. Eloff:
Secure Authentication combined with Anonymity: The end of an oxymoron? 1-11 - Maree Pather, L. M. Venter:
Securing SOAP Messages with a Global Message Handler and a Standardized Envelope. 1-13 - Andreas U. Schmidt, Nicolai Kuntze, Thomas Rauch:
Security for Distributed Web-Services via Aspect-Oriented Programming. 1-12 - Jeffy Mwakalinga, Louise Yngström:
Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system. 1-11 - R. Mulder, Rossouw von Solms:
The Proliferation of Wireless Devices and its Role in Corporate Governance. 1-11 - Russell Cloran, Barry Irwin:
Trust on the Web. 1-9 - Barry Irwin:
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams. ISSA 2005: 1-10
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.