The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Reinhardt A. Botha: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Reinhardt A. Botha, Jan H. P. Eloff
    Designing Role Hierarchies for Access Control in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2001, pp:117-122 [Conf]
  2. Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff
    A Context-Sensitive Access Control Model and Prototype Implementation. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:341-350 [Conf]
  3. Reinhardt A. Botha
    Towards Semantic Integrity in Rational Databases. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:287-298 [Conf]
  4. Jacobus A. Ophoff, Reinhardt A. Botha
    Privacy-enhancing Call Management in an IP-based Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICWMC, 2006, pp:42- [Conf]
  5. Reinhardt A. Botha, Jan H. P. Eloff
    Access Control in Document-centric Workflow Systems An Agent-based Approach. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:6, pp:525-532 [Journal]
  6. Reinhardt A. Botha, Tshepo G. Gaadingwe
    Reflecting on 20 SEC conferences. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:4, pp:247-256 [Journal]
  7. Reinhardt A. Botha, Jan H. P. Eloff
    Separation of duties for access control enforcement in workflow environments. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2001, v:40, n:3, pp:666-682 [Journal]
  8. Reinhardt A. Botha, Jan H. P. Eloff
    A framework for access control in workflow systems. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:3, pp:126-133 [Journal]
  9. Reinhardt A. Botha, Jan H. P. Eloff
    An access control architecture for XML documents in workflow environments. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2002, v:28, n:, pp:3-10 [Journal]
  10. C. Papenfus, Reinhardt A. Botha
    An XML based approach to enforcing history-based separation of duty policies in heterogeneous workflow environments. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2000, v:26, n:, pp:60-68 [Journal]
  11. S. Perelson, Reinhardt A. Botha
    Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2000, v:26, n:, pp:212-216 [Journal]
  12. S. Perelson, Reinhardt A. Botha, Jan H. P. Eloff
    Separation of Duty administration. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2001, v:27, n:, pp:64-69 [Journal]

  13. A Model for Secure Value-Added Service Subscriptions in Cellular Networks. [Citation Graph (, )][DBLP]


  14. Revisiting Reachability Management as a Multilateral Security Mechanism. [Citation Graph (, )][DBLP]


  15. From desktop to mobile: Examining the security experience. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002