Sciweavers

ISSA
2004
13 years 6 months ago
Intrinsic Legal Issues In It Security
E-commerce is a rapidly expanding sector all over the world. While this is apparently good news to the world's consumers and business companies, it is creating big challenges...
Respickius Casmir
ISSA
2004
13 years 6 months ago
Propagating Trust In The Web Services Framework
In this paper, we discuss one possible way of establishing trust between a user entity and a web service. We will assume that the user entity is machine-based (i.e. some software,...
Anitta Thomas
ISSA
2004
13 years 6 months ago
Security Considerations In A Global Message Service Handler Design
: Web services are generally accepted as the most interoperable application interface today on the Web. In the context of a global electronic marketplace this is an essential facto...
Johannes J. van Eeden
ISSA
2004
13 years 6 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
ISSA
2004
13 years 6 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
ISSA
2004
13 years 6 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
ISSA
2004
13 years 6 months ago
The Protection Of Public Health Data - A Case Study
South Africa's health system consists of a large public sector and a smaller but fast-growing private sector. Health care varies from the most basic primary health care, offe...
S. Nkundlaa
ISSA
2004
13 years 6 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
ISSA
2004
13 years 6 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
ISSA
2004
13 years 6 months ago
An Investigation Into Computer Forensic Tools
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
K. K. Arthur