The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jan H. P. Eloff: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Reinhardt A. Botha, Jan H. P. Eloff
    Designing Role Hierarchies for Access Control in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2001, pp:117-122 [Conf]
  2. Stephanie Teufel, Jan H. P. Eloff, Kurt Bauknecht, Dimitris Karagiannis
    Information Security Concepts in Computer Supported Cooperative Work [Citation Graph (0, 0)][DBLP]
    DEXA, 1995, pp:621-631 [Conf]
  3. Les Labuschagne, Jan H. P. Eloff
    E-Commerce Strategy Formulation. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:289-302 [Conf]
  4. Sergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff
    On Lattices in Access Control Models. [Citation Graph (0, 0)][DBLP]
    ICCS, 2006, pp:374-387 [Conf]
  5. Paula Kotzé, Mariki M. Eloff, Ayodele Adesina-Ojo, Jan H. P. Eloff
    Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics. [Citation Graph (0, 0)][DBLP]
    ICEIS (5), 2004, pp:97-106 [Conf]
  6. Elmé Smith, Jan H. P. Eloff
    Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:141-156 [Conf]
  7. H. S. Venter, Les Labuschagne, Jan H. P. Eloff
    Real-time Risk Analysis on the Internet: a prototype. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:11-28 [Conf]
  8. Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier
    Exploring Forensic Data with Self-Organizing Maps. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:113-123 [Conf]
  9. Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter
    Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:105-112 [Conf]
  10. J. P. Klut, Jan H. P. Eloff
    MethoDex: A Methodology for Expert Systems Development. [Citation Graph (0, 0)][DBLP]
    ISMIS, 1993, pp:106-115 [Conf]
  11. T. Morkel, Jan H. P. Eloff, Martin S. Olivier
    Using Image Steganography for Decryptor Distribution. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:322-330 [Conf]
  12. Marijke Coetzee, Jan H. P. Eloff
    Secure Database Connectivity on the WWW. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:275-286 [Conf]
  13. Marijke Coetzee, Jan H. P. Eloff
    A Framework for Web Services Trust. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:74-86 [Conf]
  14. Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff
    A Context-Sensitive Access Control Model and Prototype Implementation. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:341-350 [Conf]
  15. C. J. Bosch, Jan H. P. Eloff, John M. Carroll
    International Standards and Organizational Security Needs: Bridging the Gap. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:171-183 [Conf]
  16. Mariki M. Eloff, Jan H. P. Eloff
    Human Computer Interaction: An Information Security Perspectives. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:535-546 [Conf]
  17. Mariki M. Eloff, Jan H. P. Eloff
    Information Security Management System: Processes and Products. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:193-204 [Conf]
  18. Jan H. P. Eloff, R. Körner
    A methodology for accrediting a commercial distributed database. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:210-221 [Conf]
  19. R. Kruger, Jan H. P. Eloff
    A common criteria framework for the evaluation of information technology systems security. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:197-209 [Conf]
  20. Les Labuschagne, Jan H. P. Eloff
    Activating dynamic counter measures to reduce risk. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:187-196 [Conf]
  21. Alida Liebenberg, Jan H. P. Eloff
    MASS: Model for an Auditing Security System. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:141-150 [Conf]
  22. A. Martins, Jan H. P. Eloff
    Information Security Culture. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:203-214 [Conf]
  23. M. Wojcik, Jan H. P. Eloff, H. S. Venter
    Trust Model Architecture: Defining Prejudice by Learning. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:182-191 [Conf]
  24. H. A. S. Booysen, Jan H. P. Eloff
    Classification of objects for improved access control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:3, pp:251-265 [Journal]
  25. Reinhardt A. Botha, Jan H. P. Eloff
    Access Control in Document-centric Workflow Systems An Agent-based Approach. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:6, pp:525-532 [Journal]
  26. Karin P. Badenhorst, Jan H. P. Eloff
    TOPM: a formal approach to the optimization of information technology risk management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:5, pp:411-435 [Journal]
  27. Marijke Coetzee, Jan H. P. Eloff
    Towards Web Service access control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:559-570 [Journal]
  28. Jan H. P. Eloff, Ralph Holbein, Stephanie Teufel
    Security classification for documents. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:1, pp:55-71 [Journal]
  29. Jan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst
    A comparative framework for risk analysis methods. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:6, pp:597-603 [Journal]
  30. Karin Höne, Jan H. P. Eloff
    Information security policy what do international information security standards say? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:5, pp:402-409 [Journal]
  31. Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff
    Uncovering identities: A study into VPN tunnel fingerprinting. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:97-105 [Journal]
  32. J. Johnston, Jan H. P. Eloff, Les Labuschagne
    Security and human computer interfaces. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:675-684 [Journal]
  33. Willem G. de Ru, Jan H. P. Eloff
    Risk analysis modelling with the use of fuzzy logic. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:3, pp:239-248 [Journal]
  34. Les Labuschagne, Jan H. P. Eloff
    Improved system-access control using complementary technologies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:543-549 [Journal]
  35. Les Labuschagne, Jan H. P. Eloff
    The use of real-time risk analysis to enable dynamic activation of countermeasures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:4, pp:347-357 [Journal]
  36. Gert van der Merwe, Jan H. P. Eloff
    Software source code, visual risk analysis: an example. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:233-252 [Journal]
  37. Elmé Smith, Jan H. P. Eloff
    A Prototype for Assessing Information Technology Risks in Health Care. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:3, pp:266-284 [Journal]
  38. C. M. Trompeter, Jan H. P. Eloff
    A Framework for the Implementation of Socio-ethical Controls in Information Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:5, pp:384-391 [Journal]
  39. H. S. Venter, Jan H. P. Eloff
    Vulnerabilities categories for intrusion detection system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:617-619 [Journal]
  40. H. S. Venter, Jan H. P. Eloff
    A taxonomy for information security technologies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:4, pp:299-307 [Journal]
  41. H. S. Venter, Jan H. P. Eloff
    Vulnerability forecasting - a conceptual model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:6, pp:489-497 [Journal]
  42. H. S. Venter, Jan H. P. Eloff
    Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:8, pp:683-692 [Journal]
  43. Willem G. de Ru, Jan H. P. Eloff
    Enhanced Password Authentication through Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Expert, 1997, v:12, n:6, pp:38-45 [Journal]
  44. Elmé Smith, Jan H. P. Eloff
    Cognitive Fuzzy Modeling for Enhanced Risk Assessment in a Health Care Institution. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2000, v:15, n:2, pp:69-75 [Journal]
  45. Reinhardt A. Botha, Jan H. P. Eloff
    Separation of duties for access control enforcement in workflow environments. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2001, v:40, n:3, pp:666-682 [Journal]
  46. Reinhardt A. Botha, Jan H. P. Eloff
    A framework for access control in workflow systems. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:3, pp:126-133 [Journal]
  47. Les Labuschagne, Jan H. P. Eloff
    Electronic commerce: the information-security challenge. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:154-157 [Journal]
  48. Les Labuschagne, Jan H. P. Eloff
    Real-time risk analysis using Java concepts. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:212-217 [Journal]
  49. D. N. J. Mostert, Jan H. P. Eloff, Sebastiaan H. von Solms
    A methodology for measuring user satisfaction. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1989, v:25, n:5, pp:545-556 [Journal]
  50. Reinhardt A. Botha, Jan H. P. Eloff
    An access control architecture for XML documents in workflow environments. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2002, v:28, n:, pp:3-10 [Journal]
  51. S. Perelson, Reinhardt A. Botha, Jan H. P. Eloff
    Separation of Duty administration. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2001, v:27, n:, pp:64-69 [Journal]
  52. Elmé Smith, Jan H. P. Eloff
    A new approach to risk management in the health-care domain. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2001, v:27, n:, pp:2-11 [Journal]
  53. H. S. Venter, Jan H. P. Eloff
    Harmonising vulnerability categories. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2002, v:29, n:, pp:24-31 [Journal]
  54. H. S. Venter, Jan H. P. Eloff
    Evaluating vulnerability scanners using harmonised vulnerability categories. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2003, v:31, n:, pp:40-45 [Journal]
  55. Marijke Coetzee, Jan H. P. Eloff
    A Trust and Context Aware Access Control Model for Web Services Conversations. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:115-124 [Conf]
  56. Keshnee Padayachee, Jan H. P. Eloff
    Enhancing Optimistic Access Controls with Usage Control. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:75-82 [Conf]

  57. Defining a Trusted Service-Oriented Network Environment. [Citation Graph (, )][DBLP]


  58. Considerations Towards a Cyber Crime Profiling System. [Citation Graph (, )][DBLP]


  59. Analysis of Web Proxy Logs. [Citation Graph (, )][DBLP]


  60. Applying Machine Trust Models to Forensic Investigations. [Citation Graph (, )][DBLP]


  61. An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report. [Citation Graph (, )][DBLP]


  62. Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. [Citation Graph (, )][DBLP]


  63. Simulating adversarial interactions between intruders and system administrators using OODA-RR. [Citation Graph (, )][DBLP]


  64. Towards a Framework for a Network Warfare Capability. [Citation Graph (, )][DBLP]


  65. UML Modelling of Digital Forensic Process Models (DFPMs). [Citation Graph (, )][DBLP]


  66. Framework for a Digital Forensic Investigation. [Citation Graph (, )][DBLP]


  67. Using IT Benchmarking Principles to Design an Information Security Benchmark Model. [Citation Graph (, )][DBLP]


  68. Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. [Citation Graph (, )][DBLP]


  69. A new Access Control model based on the Chinese Wall Security Policy Model. [Citation Graph (, )][DBLP]


  70. An overview of image steganography. [Citation Graph (, )][DBLP]


  71. Metadata for trust in service-oriented architectures. [Citation Graph (, )][DBLP]


  72. Standardising vulnerability categories. [Citation Graph (, )][DBLP]


  73. Information security: The moving target. [Citation Graph (, )][DBLP]


  74. SMSSec: An end-to-end protocol for secure SMS. [Citation Graph (, )][DBLP]


  75. Computer security methodology: Risk analysis and project definition. [Citation Graph (, )][DBLP]


  76. Framework of a methodology for the life cycle of computer security in an organization. [Citation Graph (, )][DBLP]


  77. Adapting usage control as a deterrent to address the inadequacies of access controls. [Citation Graph (, )][DBLP]


  78. Building access control models with attribute exploration. [Citation Graph (, )][DBLP]


  79. Editorial. [Citation Graph (, )][DBLP]


  80. A framework and assessment instrument for information security culture. [Citation Graph (, )][DBLP]


  81. A security privacy aware architecture and protocol for a single smart card used for multiple services. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002