Search the dblp DataBase
Jan H. P. Eloff :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Reinhardt A. Botha , Jan H. P. Eloff Designing Role Hierarchies for Access Control in Workflow Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2001, pp:117-122 [Conf ] Stephanie Teufel , Jan H. P. Eloff , Kurt Bauknecht , Dimitris Karagiannis Information Security Concepts in Computer Supported Cooperative Work [Citation Graph (0, 0)][DBLP ] DEXA, 1995, pp:621-631 [Conf ] Les Labuschagne , Jan H. P. Eloff E-Commerce Strategy Formulation. [Citation Graph (0, 0)][DBLP ] I3E, 2001, pp:289-302 [Conf ] Sergei A. Obiedkov , Derrick G. Kourie , Jan H. P. Eloff On Lattices in Access Control Models. [Citation Graph (0, 0)][DBLP ] ICCS, 2006, pp:374-387 [Conf ] Paula Kotzé , Mariki M. Eloff , Ayodele Adesina-Ojo , Jan H. P. Eloff Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics. [Citation Graph (0, 0)][DBLP ] ICEIS (5), 2004, pp:97-106 [Conf ] Elmé Smith , Jan H. P. Eloff Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 2001, pp:141-156 [Conf ] H. S. Venter , Les Labuschagne , Jan H. P. Eloff Real-time Risk Analysis on the Internet: a prototype. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 1999, pp:11-28 [Conf ] Bennie Fei , Jan H. P. Eloff , H. S. Venter , Martin S. Olivier Exploring Forensic Data with Self-Organizing Maps. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:113-123 [Conf ] Rut Laubscher , Cobus Rabe , Martin S. Olivier , Jan H. P. Eloff , H. S. Venter Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:105-112 [Conf ] J. P. Klut , Jan H. P. Eloff MethoDex: A Methodology for Expert Systems Development. [Citation Graph (0, 0)][DBLP ] ISMIS, 1993, pp:106-115 [Conf ] T. Morkel , Jan H. P. Eloff , Martin S. Olivier Using Image Steganography for Decryptor Distribution. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:322-330 [Conf ] Marijke Coetzee , Jan H. P. Eloff Secure Database Connectivity on the WWW. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:275-286 [Conf ] Marijke Coetzee , Jan H. P. Eloff A Framework for Web Services Trust. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:74-86 [Conf ] Damian G. Cholewka , Reinhardt A. Botha , Jan H. P. Eloff A Context-Sensitive Access Control Model and Prototype Implementation. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:341-350 [Conf ] C. J. Bosch , Jan H. P. Eloff , John M. Carroll International Standards and Organizational Security Needs: Bridging the Gap. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:171-183 [Conf ] Mariki M. Eloff , Jan H. P. Eloff Human Computer Interaction: An Information Security Perspectives. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:535-546 [Conf ] Mariki M. Eloff , Jan H. P. Eloff Information Security Management System: Processes and Products. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:193-204 [Conf ] Jan H. P. Eloff , R. Körner A methodology for accrediting a commercial distributed database. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:210-221 [Conf ] R. Kruger , Jan H. P. Eloff A common criteria framework for the evaluation of information technology systems security. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:197-209 [Conf ] Les Labuschagne , Jan H. P. Eloff Activating dynamic counter measures to reduce risk. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:187-196 [Conf ] Alida Liebenberg , Jan H. P. Eloff MASS: Model for an Auditing Security System. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:141-150 [Conf ] A. Martins , Jan H. P. Eloff Information Security Culture. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:203-214 [Conf ] M. Wojcik , Jan H. P. Eloff , H. S. Venter Trust Model Architecture: Defining Prejudice by Learning. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:182-191 [Conf ] H. A. S. Booysen , Jan H. P. Eloff Classification of objects for improved access control. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:3, pp:251-265 [Journal ] Reinhardt A. Botha , Jan H. P. Eloff Access Control in Document-centric Workflow Systems An Agent-based Approach. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:6, pp:525-532 [Journal ] Karin P. Badenhorst , Jan H. P. Eloff TOPM: a formal approach to the optimization of information technology risk management. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:5, pp:411-435 [Journal ] Marijke Coetzee , Jan H. P. Eloff Towards Web Service access control. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:7, pp:559-570 [Journal ] Jan H. P. Eloff , Ralph Holbein , Stephanie Teufel Security classification for documents. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:55-71 [Journal ] Jan H. P. Eloff , Les Labuschagne , Karin P. Badenhorst A comparative framework for risk analysis methods. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:6, pp:597-603 [Journal ] Karin Höne , Jan H. P. Eloff Information security policy what do international information security standards say? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:402-409 [Journal ] Vafa D. Izadinia , Derrick G. Kourie , Jan H. P. Eloff Uncovering identities: A study into VPN tunnel fingerprinting. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:97-105 [Journal ] J. Johnston , Jan H. P. Eloff , Les Labuschagne Security and human computer interfaces. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:675-684 [Journal ] Willem G. de Ru , Jan H. P. Eloff Risk analysis modelling with the use of fuzzy logic. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:239-248 [Journal ] Les Labuschagne , Jan H. P. Eloff Improved system-access control using complementary technologies. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:543-549 [Journal ] Les Labuschagne , Jan H. P. Eloff The use of real-time risk analysis to enable dynamic activation of countermeasures. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:347-357 [Journal ] Gert van der Merwe , Jan H. P. Eloff Software source code, visual risk analysis: an example. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:233-252 [Journal ] Elmé Smith , Jan H. P. Eloff A Prototype for Assessing Information Technology Risks in Health Care. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:3, pp:266-284 [Journal ] C. M. Trompeter , Jan H. P. Eloff A Framework for the Implementation of Socio-ethical Controls in Information Security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:5, pp:384-391 [Journal ] H. S. Venter , Jan H. P. Eloff Vulnerabilities categories for intrusion detection system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:617-619 [Journal ] H. S. Venter , Jan H. P. Eloff A taxonomy for information security technologies. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:4, pp:299-307 [Journal ] H. S. Venter , Jan H. P. Eloff Vulnerability forecasting - a conceptual model. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:6, pp:489-497 [Journal ] H. S. Venter , Jan H. P. Eloff Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:8, pp:683-692 [Journal ] Willem G. de Ru , Jan H. P. Eloff Enhanced Password Authentication through Fuzzy Logic. [Citation Graph (0, 0)][DBLP ] IEEE Expert, 1997, v:12, n:6, pp:38-45 [Journal ] Elmé Smith , Jan H. P. Eloff Cognitive Fuzzy Modeling for Enhanced Risk Assessment in a Health Care Institution. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2000, v:15, n:2, pp:69-75 [Journal ] Reinhardt A. Botha , Jan H. P. Eloff Separation of duties for access control enforcement in workflow environments. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 2001, v:40, n:3, pp:666-682 [Journal ] Reinhardt A. Botha , Jan H. P. Eloff A framework for access control in workflow systems. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:3, pp:126-133 [Journal ] Les Labuschagne , Jan H. P. Eloff Electronic commerce: the information-security challenge. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:154-157 [Journal ] Les Labuschagne , Jan H. P. Eloff Real-time risk analysis using Java concepts. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:212-217 [Journal ] D. N. J. Mostert , Jan H. P. Eloff , Sebastiaan H. von Solms A methodology for measuring user satisfaction. [Citation Graph (0, 0)][DBLP ] Inf. Process. Manage., 1989, v:25, n:5, pp:545-556 [Journal ] Reinhardt A. Botha , Jan H. P. Eloff An access control architecture for XML documents in workflow environments. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2002, v:28, n:, pp:3-10 [Journal ] S. Perelson , Reinhardt A. Botha , Jan H. P. Eloff Separation of Duty administration. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2001, v:27, n:, pp:64-69 [Journal ] Elmé Smith , Jan H. P. Eloff A new approach to risk management in the health-care domain. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2001, v:27, n:, pp:2-11 [Journal ] H. S. Venter , Jan H. P. Eloff Harmonising vulnerability categories. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2002, v:29, n:, pp:24-31 [Journal ] H. S. Venter , Jan H. P. Eloff Evaluating vulnerability scanners using harmonised vulnerability categories. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2003, v:31, n:, pp:40-45 [Journal ] Marijke Coetzee , Jan H. P. Eloff A Trust and Context Aware Access Control Model for Web Services Conversations. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:115-124 [Conf ] Keshnee Padayachee , Jan H. P. Eloff Enhancing Optimistic Access Controls with Usage Control. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:75-82 [Conf ] Defining a Trusted Service-Oriented Network Environment. [Citation Graph (, )][DBLP ] Considerations Towards a Cyber Crime Profiling System. [Citation Graph (, )][DBLP ] Analysis of Web Proxy Logs. [Citation Graph (, )][DBLP ] Applying Machine Trust Models to Forensic Investigations. [Citation Graph (, )][DBLP ] An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report. [Citation Graph (, )][DBLP ] Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. [Citation Graph (, )][DBLP ] Simulating adversarial interactions between intruders and system administrators using OODA-RR. [Citation Graph (, )][DBLP ] Towards a Framework for a Network Warfare Capability. [Citation Graph (, )][DBLP ] UML Modelling of Digital Forensic Process Models (DFPMs). [Citation Graph (, )][DBLP ] Framework for a Digital Forensic Investigation. [Citation Graph (, )][DBLP ] Using IT Benchmarking Principles to Design an Information Security Benchmark Model. [Citation Graph (, )][DBLP ] Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. [Citation Graph (, )][DBLP ] A new Access Control model based on the Chinese Wall Security Policy Model. [Citation Graph (, )][DBLP ] An overview of image steganography. [Citation Graph (, )][DBLP ] Metadata for trust in service-oriented architectures. [Citation Graph (, )][DBLP ] Standardising vulnerability categories. [Citation Graph (, )][DBLP ] Information security: The moving target. [Citation Graph (, )][DBLP ] SMSSec: An end-to-end protocol for secure SMS. [Citation Graph (, )][DBLP ] Computer security methodology: Risk analysis and project definition. [Citation Graph (, )][DBLP ] Framework of a methodology for the life cycle of computer security in an organization. [Citation Graph (, )][DBLP ] Adapting usage control as a deterrent to address the inadequacies of access controls. [Citation Graph (, )][DBLP ] Building access control models with attribute exploration. [Citation Graph (, )][DBLP ] Editorial. [Citation Graph (, )][DBLP ] A framework and assessment instrument for information security culture. [Citation Graph (, )][DBLP ] A security privacy aware architecture and protocol for a single smart card used for multiple services. [Citation Graph (, )][DBLP ] Search in 0.097secs, Finished in 0.103secs