dblp.uni-trier.dewww.uni-trier.de

Jan H. P. Eloff Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2008
85 Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne: Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008 ISSA, Pretoria, South Africa 2008
84EEKweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff: Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393
83EEMichal Köhn, Jan H. P. Eloff, Martin S. Olivier: UML Modelling of Digital Forensic Process Models (DFPMs). ISSA 2008: 1-13
82EENamosha Veerasamy, Jan H. P. Eloff: Towards a Framework for a Network Warfare Capability. ISSA 2008: 1-18
81EEHein S. Venter, Jan H. P. Eloff, Y. L. Li: Standardising vulnerability categories. Computers & Security 27(3-4): 71-83 (2008)
80EEJohnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff: SMSSec: An end-to-end protocol for secure SMS. Computers & Security 27(5-6): 154-167 (2008)
2007
79 Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa Springer 2007
78EEEmmanuel A. Adigun, Jan H. P. Eloff: Defining a Trusted Service-Oriented Network Environment. ARES 2007: 1245-1250
77 Keshnee Padayachee, Jan H. P. Eloff: An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report. IMECS 2007: 1060-1065
76EET. J. Grant, H. S. Venter, Jan H. P. Eloff: Simulating adversarial interactions between intruders and system administrators using OODA-RR. SAICSIT Conf. 2007: 46-55
75EEA. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff: Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. SEC 2007: 217-228
74EEMarijke Coetzee, Jan H. P. Eloff: A Trust and Context Aware Access Control Model for Web Services Conversations. TrustBus 2007: 115-124
73EEKeshnee Padayachee, Jan H. P. Eloff: Enhancing Optimistic Access Controls with Usage Control. TrustBus 2007: 75-82
72EEA. Da Veiga, Jan H. P. Eloff: An Information Security Governance Framework. IS Management 24(4): 361-372 (2007)
2006
71 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2006
70EESergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff: On Lattices in Access Control Models. ICCS 2006: 374-387
69 Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter: Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258
68 Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier: Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65
67EELeonie McManus, Jan H. P. Eloff: Using IT Benchmarking Principles to Design an Information Security Benchmark Model. ISSA 2006: 1-11
66EEMichael Kohn, Martin S. Olivier, Jan H. P. Eloff: Framework for a Digital Forensic Investigation. ISSA 2006: 1-7
65EET. Morkel, Jan H. P. Eloff, Martin S. Olivier: Using Image Steganography for Decryptor Distribution. OTM Workshops (1) 2006: 322-330
64EEMarijke Coetzee, Jan H. P. Eloff: A Framework for Web Services Trust. SEC 2006: 74-86
63EEMarika Wojcik, Jan H. P. Eloff, H. S. Venter: Trust Model Architecture: Defining Prejudice by Learning. TrustBus 2006: 182-191
62EEVafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff: Uncovering identities: A study into VPN tunnel fingerprinting. Computers & Security 25(2): 97-105 (2006)
2005
61 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2005
60 Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter: Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112
59 Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier: Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123
58EEM. Loock, Jan H. P. Eloff: A new Access Control model based on the Chinese Wall Security Policy Model. ISSA 2005: 1-10
57EET. Morkel, Jan H. P. Eloff, Martin S. Olivier: An overview of image steganography. ISSA 2005: 1-11
56EEMarijke Coetzee, Jan H. P. Eloff: Metadata for trust in service-oriented architectures. ISSA 2005: 1-12
55EEVafa D. Izadinia, Jan H. P. Eloff, Derrick G. Kourie: Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. ISSA 2005: 1-14
54EEMarijke Coetzee, Jan H. P. Eloff: An access control framework for web services. Inf. Manag. Comput. Security 13(1): 29-38 (2005)
2004
53 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa ISSA, Pretoria, South Africa 2004
52 Paula Kotzé, Mariki M. Eloff, Ayodele Adesina-Ojo, Jan H. P. Eloff: Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics. ICEIS (5) 2004: 97-106
51EEH. S. Venter, Jan H. P. Eloff: Vulnerability forecasting - a conceptual model. Computers & Security 23(6): 489-497 (2004)
50EEMarijke Coetzee, Jan H. P. Eloff: Towards Web Service access control. Computers & Security 23(7): 559-570 (2004)
2003
49 Mariki M. Eloff, Jan H. P. Eloff: Information Security Management System: Processes and Products. SEC 2003: 193-204
48EEH. S. Venter, Jan H. P. Eloff: A taxonomy for information security technologies. Computers & Security 22(4): 299-307 (2003)
47EEJ. Johnston, Jan H. P. Eloff, Les Labuschagne: Security and human computer interfaces. Computers & Security 22(8): 675-684 (2003)
46 H. S. Venter, Jan H. P. Eloff: Evaluating vulnerability scanners using harmonised vulnerability categories. South African Computer Journal 31: 40-45 (2003)
2002
45 A. Martins, Jan H. P. Eloff: Information Security Culture. SEC 2002: 203-214
44 Marijke Coetzee, Jan H. P. Eloff: Secure Database Connectivity on the WWW. SEC 2002: 275-286
43 Mariki M. Eloff, Jan H. P. Eloff: Human Computer Interaction: An Information Security Perspectives. SEC 2002: 535-546
42 Elmé Smith, Jan H. P. Eloff: A Prototype for Assessing Information Technology Risks in Health Care. Computers & Security 21(3): 266-284 (2002)
41 Karin Höne, Jan H. P. Eloff: Information security policy what do international information security standards say? Computers & Security 21(5): 402-409 (2002)
40 H. S. Venter, Jan H. P. Eloff: Vulnerabilities categories for intrusion detection system. Computers & Security 21(7): 617-619 (2002)
39 Reinhardt A. Botha, Jan H. P. Eloff: An access control architecture for XML documents in workflow environments. South African Computer Journal 28: 3-10 (2002)
38 H. S. Venter, Jan H. P. Eloff: Harmonising vulnerability categories. South African Computer Journal 29: 24-31 (2002)
2001
37 Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon: Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA Kluwer 2001
36EEReinhardt A. Botha, Jan H. P. Eloff: Designing Role Hierarchies for Access Control in Workflow Systems. COMPSAC 2001: 117-122
35 Elmé Smith, Jan H. P. Eloff: Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques. Conference on Information Security Management & Small Systems Security 2001: 141-156
34 Les Labuschagne, Jan H. P. Eloff: E-Commerce Strategy Formulation. I3E 2001: 289-302
33 C. M. Trompeter, Jan H. P. Eloff: A Framework for the Implementation of Socio-ethical Controls in Information Security. Computers & Security 20(5): 384-391 (2001)
32 Reinhardt A. Botha, Jan H. P. Eloff: Access Control in Document-centric Workflow Systems An Agent-based Approach. Computers & Security 20(6): 525-532 (2001)
31EEReinhardt A. Botha, Jan H. P. Eloff: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3): 666-682 (2001)
30EEReinhardt A. Botha, Jan H. P. Eloff: A framework for access control in workflow systems. Inf. Manag. Comput. Security 9(3): 126-133 (2001)
29 Elmé Smith, Jan H. P. Eloff: A new approach to risk management in the health-care domain. South African Computer Journal 27: 2-11 (2001)
28 Stephen Perelson, Reinhardt A. Botha, Jan H. P. Eloff: Separation of Duty administration. South African Computer Journal 27: 64-69 (2001)
2000
27 Sihan Qing, Jan H. P. Eloff: Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China Kluwer 2000
26 Alida Liebenberg, Jan H. P. Eloff: MASS: Model for an Auditing Security System. SEC 2000: 141-150
25 Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff: A Context-Sensitive Access Control Model and Prototype Implementation. SEC 2000: 341-350
24EEElmé Smith, Jan H. P. Eloff: Cognitive Fuzzy Modeling for Enhanced Risk Assessment in a Health Care Institution. IEEE Intelligent Systems 15(2): 69-75 (2000)
23EELes Labuschagne, Jan H. P. Eloff: Electronic commerce: the information-security challenge. Inf. Manag. Comput. Security 8(3): 154-157 (2000)
1999
22 Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren: Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands Kluwer 1999
21 H. S. Venter, Les Labuschagne, Jan H. P. Eloff: Real-time Risk Analysis on the Internet: a prototype. Conference on Information Security Management & Small Systems Security 1999: 11-28
1998
20EEGert van der Merwe, Jan H. P. Eloff: Software source code, visual risk analysis: an example. Computers & Security 17(3): 233-252 (1998)
19EELes Labuschagne, Jan H. P. Eloff: The use of real-time risk analysis to enable dynamic activation of countermeasures. Computers & Security 17(4): 347-357 (1998)
18EEH. S. Venter, Jan H. P. Eloff: Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. Computers & Security 17(8): 683-692 (1998)
17EELes Labuschagne, Jan H. P. Eloff: Real-time risk analysis using Java concepts. Inf. Manag. Comput. Security 6(5): 212-217 (1998)
1997
16 R. Kruger, Jan H. P. Eloff: A common criteria framework for the evaluation of information technology systems security. SEC 1997: 197-209
15 Jan H. P. Eloff, R. Körner: A methodology for accrediting a commercial distributed database. SEC 1997: 210-221
14EELes Labuschagne, Jan H. P. Eloff: Improved system-access control using complementary technologies. Computers & Security 16(6): 543-549 (1997)
13 Willem G. de Ru, Jan H. P. Eloff: Enhanced Password Authentication through Fuzzy Logic. IEEE Expert 12(6): 38-45 (1997)
1996
12 Les Labuschagne, Jan H. P. Eloff: Activating dynamic counter measures to reduce risk. SEC 1996: 187-196
11EEJan H. P. Eloff, Ralph Holbein, Stephanie Teufel: Security classification for documents. Computers & Security 15(1): 55-71 (1996)
10EEWillem G. de Ru, Jan H. P. Eloff: Risk analysis modelling with the use of fuzzy logic. Computers & Security 15(3): 239-248 (1996)
1995
9EEStephanie Teufel, Jan H. P. Eloff, Kurt Bauknecht, Dimitris Karagiannis: Information Security Concepts in Computer Supported Cooperative Work DEXA 1995: 621-631
8EEH. A. S. Booysen, Jan H. P. Eloff: Classification of objects for improved access control. Computers & Security 14(3): 251-265 (1995)
1994
7EEKarin P. Badenhorst, Jan H. P. Eloff: TOPM: a formal approach to the optimization of information technology risk management. Computers & Security 13(5): 411-435 (1994)
1993
6EEJ. P. Klut, Jan H. P. Eloff: MethoDex: A Methodology for Expert Systems Development. ISMIS 1993: 106-115
5 C. J. Bosch, Jan H. P. Eloff, John M. Carroll: International Standards and Organizational Security Needs: Bridging the Gap. SEC 1993: 171-183
4EEJan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst: A comparative framework for risk analysis methods. Computers & Security 12(6): 597-603 (1993)
1990
3EEKarin P. Badenhorst, Jan H. P. Eloff: Computer security methodology: Risk analysis and project definition. Computers & Security 9(4): 339-346 (1990)
1989
2EEKarin P. Badenhorst, Jan H. P. Eloff: Framework of a methodology for the life cycle of computer security in an organization. Computers & Security 8(5): 433-442 (1989)
1EED. N. J. Mostert, Jan H. P. Eloff, Sebastiaan H. von Solms: A methodology for measuring user satisfaction. Inf. Process. Manage. 25(5): 545-556 (1989)

Coauthor Index

1Ayodele Adesina-Ojo [52]
2Emmanuel A. Adigun [78]
3Kweku K. Arthur [84]
4Karin P. Badenhorst [2] [3] [4] [7]
5Kurt Bauknecht [9]
6Judith Bishop [80]
7H. A. S. Booysen [8]
8C. J. Bosch [5]
9Reinhardt A. Botha [25] [28] [30] [31] [32] [36] [39]
10John M. Carroll [5]
11Damian G. Cholewka [25]
12Marijke Coetzee [44] [50] [54] [56] [64] [74]
13Gurpreet Dhillon [37]
14Mariki M. Eloff [43] [49] [52] [53] [61] [71] [79] [85]
15Bennie Fei [59] [69]
16T. J. Grant [76]
17Ralph Holbein [11]
18Karin Höne [41]
19Vafa D. Izadinia [55] [62]
20J. Johnston [47]
21Dimitris Karagiannis [9]
22J. P. Klut [6]
23Michael Kohn [66]
24Michal Köhn [83]
25R. Körner [15]
26Paula Kotzé [52]
27Derrick G. Kourie [55] [62] [70]
28R. Kruger [16]
29Les Labuschagne [4] [12] [14] [17] [19] [21] [22] [23] [34] [37] [47] [53] [61] [71] [79] [85]
30Rut Laubscher [60]
31Y. L. Li [81]
32Alida Liebenberg [26]
33Johnny Li-Chang Lo [80]
34M. Loock [58]
35A. Martins [45]
36Leonie McManus [67]
37Gert van der Merwe [20]
38T. Morkel [57] [65]
39D. N. J. Mostert [1]
40Sergei A. Obiedkov [70]
41Martin S. Olivier [57] [59] [60] [65] [66] [68] [69] [83] [84]
42Keshnee Padayachee [73] [77]
43Stephen Perelson [28]
44Sihan Qing [27]
45Cobus Rabe [60]
46A. Maciej Rossudowski [75]
47Willem G. de Ru [10] [13]
48Elmé Smith [24] [29] [35] [42]
49Rossouw von Solms [22] [37] [79]
50Sebastiaan H. von Solms (Basie von Solms) [1]
51Stephanie Teufel [9] [11]
52C. M. Trompeter [33]
53Namosha Veerasamy [82]
54A. Da Veiga [72]
55Hein S. Venter (H. S. Venter) [18] [21] [38] [40] [46] [48] [51] [53] [59] [60] [61] [63] [68] [69] [71] [75] [76] [79] [81] [84] [85]
56Jan Verschuren [22]
57Marika Wojcik [63] [68]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)