The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sebastiaan H. von Solms: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sebastiaan H. von Solms
    The characterization of certain classes of languages in the context sensitive area by automata. [Citation Graph (0, 0)][DBLP]
    Automatentheorie und Formale Sprachen, 1973, pp:182-190 [Conf]
  2. Grzegorz Rozenberg, Sebastiaan H. von Solms
    Some Aspects of Random Context Grammars. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1976, pp:63-75 [Conf]
  3. Jacobus E. van der Merwe, Sebastiaan H. von Solms
    Electronic commerce with secure intelligent trade agent. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:452-462 [Conf]
  4. Sebastiaan H. von Solms
    Random Context Array Grammmars. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1980, pp:59-64 [Conf]
  5. Sebastiaan H. von Solms, M. V. Kisimov
    Information Security: Mutual Authentication in E-Commerce. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:15-32 [Conf]
  6. Mariki M. Eloff, Sebastiaan H. von Solms
    Information Security: Process Evaluation and Product Evaluation. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:11-18 [Conf]
  7. C. P. Louwrens, Sebastiaan H. von Solms
    "DNA-proofing" for Computer Systems - A New Approach to Computer Security? [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:121-129 [Conf]
  8. C. P. Louwrens, Sebastiaan H. von Solms
    Selection of secure single sign-on solutions for heterogeneous computing environments. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:9-24 [Conf]
  9. Martin S. Olivier, Sebastiaan H. von Solms
    DISCO - A Discretionary Security Model for Object-oriented Databases. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:345-357 [Conf]
  10. Dalenca Pottas, Sebastiaan H. von Solms
    MAPS - Model for Automated Profile Specification. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:113-126 [Conf]
  11. Dalenca Pottas, Sebastiaan H. von Solms
    Superseding Manual Generation of Access Control Specification - From Policies to Profiles. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:327-342 [Conf]
  12. A. van Rensburg, Sebastiaan H. von Solms
    A comparison of schemes for certification authorities/trusted third parties. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:222-240 [Conf]
  13. Sebastiaan H. von Solms
    Information security on the electronic superhighway. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:153-166 [Conf]
  14. Sebastiaan H. von Solms, M. P. Hertenberger
    A Case For Information Ownership in ERP Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:135-150 [Conf]
  15. Sebastiaan H. von Solms, M. P. Hertenberger
    ERPSEC - A Reference Framework to Enhance Security in ERP Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:79-94 [Conf]
  16. Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms
    MoFAC: a model for fine-grained access control. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:295-305 [Conf]
  17. Elmarie von Solms, Sebastiaan H. von Solms
    Information Security Management Through Measurement. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:59-68 [Conf]
  18. Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll
    A Process Approach to Information Security Management. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:385-399 [Conf]
  19. L. M. du Toit, Sebastiaan H. von Solms
    A Model for Organising Information Security Documentation. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:227-242 [Conf]
  20. P. W. J. van Zyl, Sebastiaan H. von Solms
    Roaming security agents enabling intelligent access control and network protection. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:452-468 [Conf]
  21. M. H. Rennhackkamp, Sebastiaan H. von Solms
    On Using an Abstract Model of Distributed Database Concurrency Control Methods. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1988, v:31, n:6, pp:570-572 [Journal]
  22. Mariki M. Eloff, Sebastiaan H. von Solms
    Information Security Management: A Hierarchical Framework for Various Approaches. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:243-256 [Journal]
  23. Mariki M. Eloff, Sebastiaan H. von Solms
    Information Security Management: An Approach to Combine Process Certification And Product Evaluation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:698-709 [Journal]
  24. D. N. J. Mostert, Sebastiaan H. von Solms
    A methodology to include computer security, safety and resilience requirements as part of the user requirement. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:4, pp:349-364 [Journal]
  25. Martin S. Olivier, Sebastiaan H. von Solms
    Building a secure database using self-protecting objects. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:3, pp:259-271 [Journal]
  26. Dalenca Pottas, Sebastiaan H. von Solms
    A computerized management reporting aid for a mainframe security system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:7, pp:653-660 [Journal]
  27. Sebastiaan H. von Solms
    Information Security - The Fourth Wave. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:165-168 [Journal]
  28. Sebastiaan H. von Solms
    Electronic commerce with secure intelligent trade agents. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:5, pp:435-446 [Journal]
  29. Sebastiaan H. von Solms, J. H. S. Geldenhuys
    Collecting security baggage on the internet. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:4, pp:337-345 [Journal]
  30. Sebastiaan H. von Solms, J. H. S. Geldenhuys
    Managing multi level security in a military intranet environment. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:3, pp:257-270 [Journal]
  31. Sebastiaan H. von Solms, Emil Marais
    From secure wired networks to secure wireless networks - what are the extra risks? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:633-637 [Journal]
  32. Sebastiaan H. von Solms, Isak van der Merwe
    The management of computer security profiles using a role-oriented approach. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:8, pp:673-680 [Journal]
  33. Sebastiaan H. von Solms, David Naccache
    On blind signatures and perfect crimes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:6, pp:581-583 [Journal]
  34. Rossouw von Solms, Sebastiaan H. von Solms
    From policies to culture. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:4, pp:275-279 [Journal]
  35. Sebastiaan H. von Solms, Rossouw von Solms
    The 10 deadly sins of information security management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:5, pp:371-376 [Journal]
  36. Rossouw von Solms, Sebastiaan H. von Solms
    Information security governance: Due care. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:7, pp:494-497 [Journal]
  37. Rossouw von Solms, Sebastiaan H. von Solms
    Information Security Governance: A model based on the Direct-Control Cycle. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:408-412 [Journal]
  38. Sebastiaan H. von Solms
    The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area [Citation Graph (0, 0)][DBLP]
    Information and Control, 1975, v:27, n:3, pp:262-271 [Journal]
  39. Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli
    A Model for Information Security Management. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:3, pp:- [Journal]
  40. E. M. Ehlers, Sebastiaan H. von Solms
    Using Random Context Structure Grammars to Represent Chemical Structures. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1989, v:30, n:3, pp:159-166 [Journal]
  41. Sebastiaan H. von Solms
    On T0L Languages over Terminals. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1975, v:3, n:3, pp:69-70 [Journal]
  42. D. N. J. Mostert, Jan H. P. Eloff, Sebastiaan H. von Solms
    A methodology for measuring user satisfaction. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1989, v:25, n:5, pp:545-556 [Journal]
  43. E. M. Ehlers, Sebastiaan H. von Solms
    A hierarchy of random-context grammars and automata. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1987, v:42, n:1, pp:1-29 [Journal]
  44. E. M. Ehlers, Sebastiaan H. von Solms
    Random context structure grammars and automata--a formal approach. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1991, v:53, n:1-2, pp:159-183 [Journal]
  45. P. G. Mulder, Sebastiaan H. von Solms
    The implementation of a protocol using automata. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1992, v:59, n:1-2, pp:53-89 [Journal]
  46. Grzegorz Rozenberg, Sebastiaan H. von Solms
    Priorities on context conditions in rewriting systems. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1978, v:14, n:1, pp:15-50 [Journal]
  47. Grzegorz Rozenberg, Sebastiaan H. von Solms
    Rewriting systems with a clocking mechanism. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1978, v:14, n:3, pp:221-280 [Journal]
  48. D. N. J. Mostert, Sebastiaan H. von Solms
    A technique to include computer security, safety, and resilience requirements as part of the requirements specification. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1995, v:31, n:1, pp:45-53 [Journal]
  49. Martin S. Olivier, Sebastiaan H. von Solms
    A Taxonomy for Secure Object-Oriented Databases. [Citation Graph (0, 7)][DBLP]
    ACM Trans. Database Syst., 1994, v:19, n:1, pp:3-46 [Journal]

  50. A Multi-component View of Digital Forensics. [Citation Graph (, )][DBLP]


  51. A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations. [Citation Graph (, )][DBLP]


  52. Biovault: Biometrically Based Encryption. [Citation Graph (, )][DBLP]


  53. A Control Framework for Digital Forensics. [Citation Graph (, )][DBLP]


  54. A path context model for addressing security in potentially non-secure environments. [Citation Graph (, )][DBLP]


Search in 0.036secs, Finished in 0.038secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002