ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2010 Information Security for South Africa
Latest Publications
TOTAL DOCUMENTS
26
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9781424454938
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Towards an ethical analysis of the W3C Web services architecture model
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588642
◽
2010
◽
Author(s):
Valiya P Gangadharan
◽
Laurette Pretorius
Keyword(s):
Web Services
◽
Ethical Analysis
◽
Architecture Model
Download Full-text
The management of security in Cloud computing
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588290
◽
2010
◽
Cited By ~ 151
Author(s):
S Ramgovind
◽
M M Eloff
◽
E Smith
Keyword(s):
Cloud Computing
Download Full-text
Deep packet inspection — Fear of the unknown
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588278
◽
2010
◽
Cited By ~ 1
Author(s):
Ryan Goss
◽
Reinhardt Botha
Keyword(s):
Deep Packet Inspection
◽
Packet Inspection
Download Full-text
A novel protocol to allow revocation of votes a hybrid voting system
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588262
◽
2010
◽
Cited By ~ 2
Author(s):
Oliver Spycher
◽
Rolf Haenni
Keyword(s):
Voting System
Download Full-text
An investigation and survey of response options for Intrusion Response Systems (IRSs)
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588654
◽
2010
◽
Cited By ~ 12
Author(s):
Nor Badrul Anuar
◽
Maria Papadaki
◽
Steve Furnell
◽
Nathan Clarke
Keyword(s):
Intrusion Response
◽
Response Options
◽
Response Systems
Download Full-text
Towards a framework to guide compliance with IS security policies and regulations in a university
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588651
◽
2010
◽
Cited By ~ 3
Author(s):
Michael Kyobe
Keyword(s):
Security Policies
◽
Is Security
Download Full-text
Secure publish-subscribe mediated virtual organizations
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588301
◽
2010
◽
Cited By ~ 1
Author(s):
Richard Ssekibuule
Keyword(s):
Virtual Organizations
Download Full-text
Towards an information security framework for service-oriented architecture
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588272
◽
2010
◽
Cited By ~ 1
Author(s):
Jacqui Chetty
◽
Marijke Coetzee
Keyword(s):
Information Security
◽
Service Oriented Architecture
◽
Security Framework
◽
Service Oriented
Download Full-text
A framework for evaluating IT security investments in a banking environment
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588343
◽
2010
◽
Author(s):
E H Smith
◽
H A Kruger
Keyword(s):
It Security
◽
Security Investments
Download Full-text
A conceptual operational risk model for SMEs: Impact on organisational information technology
2010 Information Security for South Africa
◽
10.1109/issa.2010.5588329
◽
2010
◽
Author(s):
Anass Bayaga
◽
Stephen Flowerday
Keyword(s):
Information Technology
◽
Risk Model
◽
Operational Risk
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close