Sciweavers

52 search results - page 2 / 11
» issa 2008
Sort
View
ISSA
2004
13 years 6 months ago
Propagating Trust In The Web Services Framework
In this paper, we discuss one possible way of establishing trust between a user entity and a web service. We will assume that the user entity is machine-based (i.e. some software,...
Anitta Thomas
ISSA
2004
13 years 6 months ago
South African Online Banking: Who Carries The Risk?
Today, Internet fraud occurs more and more frequently, and its devastating effects for organisations, such as banks, as well as their clients constitutes a continuous nightmare fo...
Anna Granova
ISSA
2004
13 years 6 months ago
An Investigation Into Computer Forensic Tools
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
K. K. Arthur
ISSA
2008
13 years 6 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
ISSA
2008
13 years 6 months ago
Computer Monitoring in the 21st Century Workplace
This paper attempts to lay the foundation for future research into an area that has been called the "hottest workplace privacy topic of the next decade." The existing em...
Sri Warna Mahanamahewa