default search action
South African Computer Journal, Volume 31
Volume 31, 2003
- Derrick G. Kourie:
Editorial. 1-1 - Jason Crampton, Hemanth Khambhammettu:
Access control in a distributed object environment using XML and roles. 2-8 - Nanjangud C. Narendra:
AdaptAgent : integrated architecture for adaptive workflow and agents. 9-17 - Elme Smith, Mariki M. Eloff, Lucas M. Venter, Andries Barnard, Laurette Pretorius:
Agents, security and ethics: a framework for analysis. 18-24 - S. A. Lukell, A. C. M. Hutchison:
Attack analysis of cryptographic protocols using strand spaces. 25-32 - L. Coetzlee, Elizabeth C. Botha:
Empirical results of an image-based automated vehicle identification system. 33-39 - H. S. Venter, Jan H. P. Eloff:
Evaluating vulnerability scanners using harmonised vulnerability categories. 40-45 - Thomas Schlienger, Stephanie Teufel:
Information security culture - from analysis to change. 46-52 - Martin S. Olivier:
A layered architecture for privacy - enhancing technologies. 53-61 - H. Pham, Z. Jiang:
Spam control via a distributed scheme of merit accumulation. 62-69
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.