Basie Von Solms

Professor

Official Website

Research Output
Basie von Solms

Research Output



Google Scholar Profile


Visit Prof Von Solms' Google Scholar profile to keep track of all published research articles and citations.


Bibliometric Profile



Research

2017


Von Solms, SH, von Solms, R, 'Cyber Security and Information Security – what goes where?', to appear in 'Information and Computer Security', December 2017.


Von Solms, SH, Pace, L, Bada, M, 'Measuring Cyber Security Capacity Building in Africa', presented at the IST-Africa Conference, 31 May to 2 June 2017, Windhoek, Namibia, (Overview Paper).


Blauw, F, von Solms, SH, 'Towards Quantifying and Defining Privacy Metrics for Online Users', presented at the IST-Africa Conference, 31 May to 2 June 2017, Windhoek, Namibia.


Jaquire, V, von Solms, SH, 'Developing a Cyber Counterintelligence Maturity Model for Developing Countries', presented at the IST-Africa Conference, 31 May to 2 June 2017, Windhoek, Namibia.


Newport, J, von Solms, SH, 'A Secure Cloud Storage System for Small and Medium Enterprises', presented at the IST-Africa Conference, 31 May to 2 June 2017, Windhoek, Namibia.


Van Rensburg, A, von Solms, SH, 'Vulnerability Testing in the Development Cycle', presented at the IST-Africa Conference, 31 May to 2 June 2017, Windhoek, Namibia.


De Bruin, R, von Solms, SH, 'Humanitarian perspective of Cybersecurity and Cybersecurity Governance', presented at the IST-Africa Conference, 31 May to 2 June 2017, Windhoek, Namibia.


Jaquire, VJ, Von Solms, SH, 'Cultivating a Cyber Counterintelligence Maturity Model', Paper presented at the 2017 European Conference on Cyber Warfare and Security (ECCWS 2017), May 2017, Dublin, Ireland.


Van Rensburg, A, von Solms, SH, 'Vulnerability Testing in the Website Development Cycle', Paper presented at the 2017 European Conference on Cyber Warfare and Security (ECCWS 2017), May 2017, Dublin, Ireland.


Duvenage, P, Sithole, S, von Solms, SH, 'A Conceptual Framework for Cyber Counterintelligence – theory that really matters!', presented at the European Conference on Cyber Warfare and Security (ECCWS 2017), May 2017, Dublin, Ireland.


Jaquire, V, von Solms, SH, 'Cultivating a cyber-counterintelligence maturity model', presented at the European Conference on Cyber Warfare and Security (ECCWS 2017), May 2017, Dublin, Ireland.


Van der Walt, T, von Solms, SH, 'Political Corporate Governance of ICT – essential for national service delivery and security', presented at the European Conference on Cyber Warfare and Security (ECCWS 2017), May 2017, Dublin, Ireland.


Jacobs, P, von Solms, SH, Grobler, 'Towards a Military-Based National Cybersecurity Capability Development Model', presented at the European Conference on Cyber Warfare and Security (ECCWS 2017), May 2017, Dublin, Ireland.


Jaquire, V, von Solms, SH, 'Towards a cyber counterintelligence maturity model', Proceedings of the International Conference on Cyber Warfare and Security, March 2017, Ohio, USA.





2016


De Bruin, R, Von Solms, SH, 'Cybersecurity Governance Maturity Model: A Look at Current Maturity Affairs', Presented at the Global Humanitarian Technology Conference (GHTC) 2016, Seattle, Washington, USA, 13 - 16 October 2016, Published in the Proceedings of the Conference.


Duvenage, PC, Von Solms, SH, Jaquire, V, 'Conceptualising Cyber Counterintelligence – Two Tentative Building Blocks', Presented at the 15th European Conference on Cyber Warfare and Security, Munich (Germany), 7 - 8 July 2016, Published in the Proceedings of the Conference.


Jacobs, P, Von Solms, SH, Grobler, M, 'E-CMIRC – Towards a model for the integration of services between SOCs and CSIRTs', Presented at the 15th European Conference on Cyber Warfare and Security, Munich (Germany), 7 - 8 July 2016, Published in the Proceedings of the Conference.


Von Solms, R, Von Solms, SH, 'Publish or Perish – but where?', South African Computer Journal (SACJ). July 2016.


De Bruin, R, Von Solms, SH, 'Cybersecurity Governance: How can we measure it?', IST-Africa Conference 2016, Durban, South Africa, 11 - 13 May 2016, Published in the Proceedings of the Conference.


Lang, D, von Solms, SH, 'Investigating the use of the South African National Identification Card for Electronic Transaction Processing', IST-Africa Conference 2016, Durban, South Africa, 11 - 13 May 2016, Published in the Proceedings of the Conference.


Upton, D, Von Solms, SH, 'Cyber Security Capacity Governance', Keynote presentation at the 1st International Conference on Business and Cyber Security, 11 to 12 May 2016, London, UK, Published in the Proceedings of the Conference.


Jacobs, P, Von Solms, SH, Grobler, M, 'Towards a framework for the development of business cybersecurity capabilities', The 1st International Conference on Business and Cyber Security, 11 to 12 May 2016, London, UK, Published in the Proceedings of the Conference.


Von Solms, SH, 'Towards a Cyber Governance Maturity Model for Boards of Directors', International Journal of Business and Cyber Security (IJBCS), Vol. 1, Issue 1, July 2016, also presented at the 1st International Conference on Business and Cyber Security, 11 to 12 May 2016, London, UK.


Louw, C, Von Solms, SH, 'Building Cyber Knowledge through Online Portals - A Case Study', International Journal of Business and Cyber Security (IJBCS), Vol. 1, Issue 1, July 2016, also presented at the 1st International Conference on Business and Cyber Security, 11 to 12 May 2016, London, UK.





2015


Von Solms, SH, 'Managing Cyber Risk – how do we innovate', International Journal of Excellence in Education, Vol 7, No 1, ISSN 1993-8675, Hamdan Bin Mohammed e-University, Dubai.


De Bruin, R, Von Solms, SH, 'Modelling Cyber Security Governance Maturity', ISTAS Conference, 11 to 12 November 2015, Dublin, Ireland.


Roussell, J, Von Solms, SH, 'A solution to improve the cyber security of home users', African Cyber Citizen Conference, 2 to 3 November 2015, Port Elizabeth, South Africa.


Louw, C, Von Solms, SH, 'Towards a Smartphone User Competency Evolution Model', SAICSIT 2015, 28 - 30 September 2015, Stellenbosch, South Africa.


Louw, C, Von Solms, SH, 'Game, Settings, Match – The Impact and future of Wearable Technology in Fitness and Healthcare', SATNAC Conference 2015, 6 - 9 September 2015, Hermanus, Western Cape, South Africa.


Von Solms, SH, 'A Maturity Model for part of the African Union Convention on Cyber Security', paper presented at The Science and Information Conference, July 2015, London, UK, Published in the Proceedings of the conference.


Von Solms, SH, 'An Initial Maturity Model for the African Union Convention on Cyber Security and Personal Data Protection', paper presented at The Science and Information Conference, July, 2015, London, Published in the Proceedings of the conference.


Duvenhage, PC, Von Solms, SH, Corregedor, M, 'The Cyber Counter Intelligence Process - a Conceptual Outline', European Conference on Cyber Warfare and Security, July 2015, UK, Published in the Proceedings of the conference.


Corregedor, M, von Solms, SH, 'Resurrecting Anti-Malware Through Collaboration', European Conference on Cyber Warfare and Security, July 2015, UK, Published in the Proceedings of the conference.


Von Solms, SH, 'Securing South Africa's Cyber Space by cyber securing it's small companies', paper presented at the IST Africa Conference, May 2015, Malawi, Published in the Proceedings of the conference.


Von Solms, SH, von Solms, R, 'Cyber Security in South Africa - A Letter to the Minister of Cyber Security', paper presented at the International Conference on Cyber Warfare and Security (ICCWS 2015), Kruger National Park, South Africa, April 2015, Published in the Proceedings of the conference.


Jaquire, V, Von Solms, SH, 'A Best Practice Strategy Framework for Developing Countries to secure Cyber Space', 10th International Conference on Cyber Warfare and Security, March 2015, Kruger National Park, South Africa.


Von Solms, SH, 'Cyber Security Capacity Building - How do we innovate?', paper presented at the Arabia 8 Conference, Dubai, March 2015, Published in the Proceedings of the conference.


Jaquire, V, Von Solms, SH, 'A Strategic Framework for a Secure Cyberspace in Developing Countries with special emphasis on the Risk of Cyber Warfare', International Journal of Cyber Warfare and Terrorism, 5(1), 1-18, January 2015.





2014


De Bruin, R, von Solms, SH, 'Securing Mobile Payments on Unsecure Mobile Devices', SATNAC Conference, Port Elizabeth, September 2014.


Van der Haar, D, von Solms, SH, 'CoBI: A Collective Biosignal-Based Identification Model', SATNAC Conference, Port Elizabeth, September 2014.


Duvenhage, CP, Von Solms, SH, ‘Towards a Conceptual Framework for Cyber Counterintelligence - some fundamental building blocks’ Proceeding of The 13th European Conference on Cyber Warfare and Security, July 2014, Greece.


Louw, C, Von Solms, SH, ‘Online Social Networks to Online Social Malworks – the Evolution of an Industry’, Published in the Proceedings of The IST-Africa 2014 Conference, Mauritius, May 2014.


Van der Haar, D, Von Solms, SH, ‘A Poor Man’s Biometric : Identifying Cost-effective Biometric System Criteria for SMMEs’, Published in the Proceedings of The IST-Africa 2014 Conference, Mauritius, May 2014.


Blauw, F, Von Solms, SH, ‘Streamlined Approach to Online Banking Authentication in South Africa and Europe’, Published in the Proceedings of The IST-Africa 2014 Conference, Mauritius, May 2014.


Adamski, M, Von Solms, SH, ‘An Open Speaker Recognition Enabled Identification and Authentication System’, Published in the Proceedings of The IST-Africa 2014 Conference, Mauritius, May 2014.


De Bruin, R, Von Solms, SH, ‘Securing Mobile Applications in Rural Environments’, Published in the Proceedings of The IST-Africa 2014 Conference, Mauritius, May 2014.


Van der Walt, T, Von Solms, SH, ‘The Institutionalization of Political and Corporate Governance of Information and Communication Technology in the Public Service of South Africa, a developing country’, Published in the Proceedings of The IST-Africa 2014 Conference, Mauritius, May 2014.





2013


Von Solms, ‘Critical Information Infrastructure and Cyber Security in Developing Countries: The Oversight Role of National Parliaments’, Presented at the Science and Information (SAI) Conference, 9 – 11 October 2013, London.


Van der Haar, D, von Solms, SH, ‘A best practice analysis for telebiometric deployment in open networks’, Poster, Secrypt 2013, Reykjavik, Iceland, 29 – 31 July 2013.


Louw, C, von Solms, SH, ‘Personally Identifiable Information Leakage through Online Social Networks’, Proceeding of SAICSIT 2013, East London, 7-9 October 2013, pp 69 – 71.


Van der Walt, T, Coetsee AD, S. H. von Solms, ‘Influence of International Best Practices on the South African Public Service’s Corporate Governance of ICT’, ISACA JOURNAL Volume 1, 2013.


Ellefsen D, von Solms, SH, ‘A Community-Oriented Approach to CIIP in Developing Countries ‘, Chapter 10 in ‘Securing Critical Infrastructures and Critical Control Systems’, edited by Paul Vickers, Christopher Laing, and Atta Badii, IGI-Global, 2012, ISBN: 978-1-4666-2659-1, 2013.


Kritzinger E, von Solms SH, ‘ A framework for cyber security in Africa’, Journal of Information Assurance & Cybersecurity, Vol. 2012 (2012), www.ibimapublishing.com/journals/JIACS/2012/322399/322399.pdf


Kritzinger, E, Von Solms, SH, ‘Home User Security – from Thick Security-oriented Home Users to Thin Security-Oriented Home Users’, Proceedings of Science and Information (SAI) Conference 2013, London, UK, 7-9 October 2013, pp 340-345


Von Solms, SH ‘Critical Information Infrastructure Protection – how comprehensive should it be?’, 5th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP’13), Pretoria, South Africa, November 2013.


Duvenage, CP, Von Solms, SH, ‘ A case for Cyber Couter-intelligence’, 5th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP’13), Pretoria, South Africa, November 2013.


Van der Walt, T, von Solms, SH, ‘Transforming the South African Public Service through the implementation of sustainable Corporate Governance of Information and Communication Technology’, To be presented at the eChallenges e-2013 Conference, Dublin, Ireland, 09 - 11 October 2013.


Corregedor, M, von Solms, SH, ‘Windows 8 32 bit - Improved Security?’, Presented at the AFRICON Conference, Mauritius, 9 – 11 September, 2013.


Van der Haar, D, Von Solms, SH, ‘Tag you’re it : a look at privacy issues in social media sharing’, Proceedings of the 15th Annual Conference on World Wide Web Applications (ZAWWW), 10-13 September 2013, Cape Town, South Africa.


Von Solms, SH, ‘Parliamentary Oversight of Cyber Security and Critical Information Infrastructures in Developing Countries’, Proceedings of Science and Information Conference 2013, London, UK, 7-9 October 2013, pp 335-339.





2012


Von Solms, SH, ‘A new role for ISPs as part of Critical Information Infrastructure Protection in Africa’, 2nd Information Warfare Conference, Ekwinox, February 2012.


Von Solms, SH, ‘Cyber Security and Critical Information Infrastructure Protection - Lessons for Africa’, E-GOVAFRICA Forum, Gaberone, Botswana, March 2012.


Von Solms, SH, ‘Who is watching over SA’s cyber security?;, ITWeb Security Summit, May 2012, Johannesburg


Von Solms, SH, Critical Information Infrastructure and Cyber Security : The Oversight Role of National Parliaments, 2012, paper in development.


Kritzinger E, von Solms SH, ‘ A framework for cyber security in Africa’, 10th IBIMA Conference, Barcelona, Spain, November 2012, Published in the Proceedings of the Conference.


Corregedor M, von Solms SH, ‘ATE: Anti-malware Technique Evaluator’,Information Security South Africa 2012 ( ISSA 2012) Conference, Johannesburg, May 2012, Published in the Proceedings of the Conference.


Ellefsen D, von Solms, SH, ‘Implementing Critical Information Infrastructure Protection Structures in Developing Countries‘, 6th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Washington, USA, January 2012, Published in the Proceedings of the Conference Proceeding, ISBN: 978-3-642-35763-3, Editors: Jonathan Butts and Sujeet Shenoi.


Von Solms, SH, Kritzinger E, "Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - has the CIIP and Cyber Security Rubicon been crossed?", AFRICOMM 2011, Zanzibar, November 2011, Published in the Proceedings of the Conference


Von Solms SH, ‘Cyber Security and Cyber Crime – Different sides of the same coin?’, CyberCon Africa 2012 Conference, Johannesburg.


Von Solms SH, ‘ Cyber Security in South Africa - With special reference to Cyber Crime, Critical Infrastructure Protection and Parliamentary Oversight ‘, Cyber Defence and Network Security Africa Conference, July 2012, Johannesburg.


Von Solms SH, ‘The Evolving Cyber Threat against Business Information’, CBIA Conference, October 2012, Sun City, South Africa.





2011


Von Solms, SH, ‘The Integritas System to enforce Integrity in Academic Environments’, 5th Conference on e-Learning Excellence in the Middle East, 30 Jan tot 3 Febr 2011, Dubai.


Von Solms, SH, ‘Cyber Security and Online Gambling – A Case for Regulation, Certification and Compliance Enforcement’, 8TH GRAF ANNUAL CONFERENCE Sun City Conference Centre 21 to 24 February 2011, Sun City Conference Centre.


Chaudhuri A, von Solms SH, Chaudhuri C, ‘Auditing Security Risks in Virtual Systems’, ISACA Journal, Vol 1, 2011.


Von Solms, SH, ‘The South African Cyber Security Awareness Month (SACSAM)’, THE FIRST IFIP TC 9/TC 11 SOUTHERN AFRICAN CYBER SECURITY AWARENESS WORKSHOP (SACSAW 2011), Thursday 12 May 2011, (Part of IST-Africa 2011, 11 – 13 May 2011, Gaborone, Botswana).


D Ellefsen, Von Solms, SH, ‘A Framework to Implement a National Cyber Security Structure for Developing Nations ’, THE FIRST IFIP TC 9/TC 11 SOUTHERN AFRICAN CYBER SECURITY AWARENESS WORKSHOP (SACSAW 2011), Thursday 12 May 2011, (Part of IST-Africa 2011, 11 – 13 May 2011, Gaborone, Botswana).


D Ellefsen, SH von Solms, ‘A Community-oriented Approach to CIIP in Developing Countries’, to appear in the CIP Report, George Mason University, USA


E Kritzinger, SH von Solms, ‘A New Role for Information Service Providers (ISPs) as part of Critical Information Infrastructure Protection in Africa’, to appear in the CIP Report, George Mason University, USA.


Corregedor, M, von Solms, SH, ‘Implementing Rootkits to Address Operating System Vulnerabilities’, accepted for presentation at Information Security South Africa 2011 (ISSA 2011), July 2011, Johannesburg.


Kritzinger, E & von Solms, SH, ‘Cyber security for home users: A new way of protection through awareness enforcement’, Computers & Security, Elsevier, Vol 29, p 840 to 847, 2010.





2010


Von Solms, SH, ‘The 5 Waves of Information Security – From Kristian Beckman to the Present’, Invited Key note presentation at IFIP/Sec Conference, Brisbane, Australia, September 2010, Published in the Conference Proceedings.


Von Solms, SH, ‘Securing the Internet : Fact or Fiction’, Invited paper at IFIP iNetSec2010 Conference, Sofia, Bulgaria, 5 March 2010 Published in Conference Proceedings.


Jordaan, L & von Solms, SH, "A Biometrics-based Approach to Combat SIM Swap Fraud", IFIP iNetSec2010 Conference, Sofia, Bulgaria 5 March 2010, Published in Conference Proceedings.


Ellefsen, D & von Solms, SH, ‘Critical Information Infrastructure Protection in the Developing World’, Fourth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Washington, USA, March 2010, Published in Conference Proceedings.


Ellefsen, D & von Solms, SH, ‘The Community-oriented Computer Security, Advisory and Warning Team’, IST-Africa 2010, May 2010, Durban, South Africa, Published in Conference Proceedings.


Ellefsen, D & von Solms, SH, ‘C-SAW: Critical Information Infrastructure Protection through Simplification’, Critical Information Infrastructure Protection (CIP) Conference – IFIP World Computing Congress 2010, Brisbane, Australia, September 2010 Published in Conference Proceedings.


Tolnai, A, & von Solms, SH, ‘Managing the Security Risks of Multifarious Authentication and Authorization in a Virtual Environment, BWCCA 2010, Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, Fukuoka Institute of Technology, Fukuoka, Japan, November 4-6, 2010, Published in the Conference Proceedings.


Tolnai, A, & von Solms, SH, ‘The Cloud’s Core Virtual Infrastructure Security’, ICGS3 2010, 6th International Conference on Global Security, Safety and Sustainability,) Braga, Portugal, 1-3 September 2010, To be published in the Conference Proceedings.


Tolnai, A & von Solms, SH, ‘Securing the Cloud’s Core Virtual Infrastructure’ First International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2010) (In Conjunction with The Fifth International Conference on Broadband and Wireless Computing, Communication and Applications), Fukuoka Institute of Technology, Fukuoka, Japan, November 4-6, 2010, To be published in the Conference Proceedings.


Tolnai, A & von Solms, SH, ‘A Virtualized Environment Security (VES) Model for a Secure Virtualized Environment’, The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), London, UK, 8-11 November 2010, Published in the Conference Proceedings..



CP Grobler, CP Louwrens, SH von Solms "A framework to guide the implementation of Pro-active Digital Forensics in organizations " Third International Workshop on Digital Forensics (WSDF 2010) (in conjunction with the Fifth International Conference on Availability, Reliability and Security (ARES 2010) February 15th – 18th, 2010 Andrzej Frycz Modrzewski Cracow College, Krakow, Poland, Published in the Conference Proceedings.


CP Grobler, CP Louwrens, SH von Solms, "A multi-component view of Digital Forensics" Third International Workshop on Digital Forensics (WSDF 2010) (in conjunction with the Fifth International Conference on Availability, Reliability and Security (ARES 2010)February 15th – 18th, 2010 Andrzej Frycz Modrzewski Cracow College, Krakow, Poland, Published in the Conference Proceedings.





2009


Grobler, MM & von Solms, SH, Fusing Business, Science and Law : Presenting Digital Evidence in Court, Journal of Contemporary Management, 6, 375-389, South Africa.


B Tait & von Solms SH, BioVault: biometrically based encryption, International Journal of Electronic Security and Digital Forensics, 2, 269-279, Inderscience .


Tait, B & von Solms, SH, Biometrically Based Electronic Signatures for a Public Networked Environment, Proceedings of the 5th International Conference on Global Security, Safety and Sustainability, London, UK, September 2009, 174-182

Tait, B & von Solms, SH, Biovault : Biometrically based encryption, Proceedings of the 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, Nancy, France, September 2009, pp 39-50

SH von Solms & R von Solms, Information Security Governance, Springer, New York, pp 134

E Kritzinger & von Solms, SH, Information Security within an E-Learning Environment, Chapter 21 in book ‘Social and Organizational Liabilities in Information Security’, M Gupta & R Sharman (Eds), Information Science, New York, 2009.


Tolnai, A & von Solms, SH. 'Solving security issues by means of an Information Security Awareness Portal'. The 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009). London, UK. Presented in November 2009. (Refereed).


Lessing, M & Von Solms, SH. 'Live Forensic Acquisition as Alternative to Traditional Forensic Processes'. September 2008. Mannheim, Germany: IT Management and IT Forensics. (Refereed and Published). (ISBN: 978-3-88579-234-5)..


Grobler, MM & Von Solms, SH. 'Modelling Live Forensic Acquisition'. University of Piraeus, Greece: Workshop on Digital Forensics & Incident Analysis – WDFIA 2009. To be presented in June 2009. (Refereed).


Grobler, MM & Von Solms, SH. 'A Theoretical Approach to Live Forensic Acquisition'. Johannesburg: ISSA. To be presented in July 2009. (Refereed).


Assefa, S & von Solms, SH, ‘Information Security Drivers for e-Learning Management Systems (e-LMS), e-Learning Africa Conference – 4th International Conference on ICT for Development, Education and Training, 27 – 29 May 2009, Dakar, Senegal (will be published in the Proceedings of the Conference).


Assefa, S & von Solms, SH, An Information Security Reference Framework for e-Learning Management Systems (ISRFe-LMS), IFIP world Conference on Computers in Education (WCCE 2009), 27 – 31 July 2009, Brazil (will be published in the Proceedings of the Conference).


Von Solms, SH, ‘Is the Information Security King naked?’, Key note address at ACISP – the 14th International Australasian Conference on Information Security and Privacy, 1 – 3 July 2009, Brisbane, Australia (will be published in the Proceedings of the Conference).





2008


Crossingham, C, von Solms, SH, ‘BASE: A Proposed Secure Biometric Authentication System’, Proceedings of the 1st IFIP WG 6.1 Conference on Policies and Research in Identity Management, Springer, 2008.


Andrade, C, von Solms, SH, ‘Investigating and Comparing Multimodal Biometric Techniques’, Proceedings of the 1st IFIP WG 6.1 Conference on Policies and Research in Identity Management, Springer, 2008.


Tait, B, von Solms, SH, ‘Secure Biometrically Based Authentication Protocol for a Public Network Environment’, Proceedings of the 4th International Conference Global e-Security, Communications in Computer and Information Science, 12, 2008, Springer, 2008.


Lessing, M, von Solms SH, ‘Live Forensic Acquisition as alternative to traditional Forensic Processes, Proceedings of the 4th International Conference on IT Incident Management & IT Forensics, Gesellschaft fur Informatik, Bonn, 2008.


Lessing, M, von Solms SH, ‘Building a World Class Information Security Governance Model’, Proceedings of IST-Africa 2008 Conference, Published in: IST-Africa 2008 Conference Proceedings, Paul Cunningham and Miriam Cunningham (Eds), IIMC International Information Management Corporation, 2008, ISBN: 978-1-905824-07-6.


Von Solms, SH, ‘Critical Information Infrastructure Protection – Essential during War times, Peace Times or both?’, Proceedings of the International IFIP TC 9 Conference on ICT uses in Warfare and the safeguarding of Peace, Published by the CSIR, Pretoria.





2007


Christian Josef Eibl, Sigrid Schubert (University of Siegen, Germany), Basie von Solms
University of Johannesburg.


Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Contents, 22nd IFIP TC 11 International Information Security Conference, Johannesburg, South Africa, 14 to 16 May 2007. Published in the Proceedings of the Conference, Springer, 2007 .





2006


SH von Solms, ‘A Framework for an Effective Information Security Governance Strategy’, IFIP World Computer Confence 2006 (Invited Paper), 25 August 2006, Santiago, Chile.


SH von Solms, ‘ICT Risk Governance in a University Environment’, CITTE Conference, 19-20 September 2006, Pretoria.


SH von Solms, ‘What every Vice-Chancellor and Council Members should know about the use of ICT’, CITTE Conference, 19-20 September 2006, Pretoria.


SH von Solms, IT Governance in Local Authorities, LOGICT Konferensie , 19 Mei 2006, Hermanus.


SH von Solms, ‘Executing a result-driven Information Security Governance Framework Strategy’, IT Africa Congress 2006 (Invited Paper), 14-15 Nov 2006, Midrand, Johannesburg.


SH von Solms, ‘A Framework for IT Governance – A Case study at the EDEN District’, LOGICT 2006 (Invited Paper), 6-7 November 2006, Wildernis.


SH von Solms, C Louwrens, C Reekie, T Grobler, ‘A Control Framework for Digital Forensics’, IFIP International Conference on Digital Forensics, Orlando, Florida, USA, 29 January – 1 February 2006, Published in the Conference Proceedings (Advances in Digital Forensics II) by Springer , pp 343 – 355 (Fully peer reviewed by formal Program Committee).


von Solms, SH, Kritzinger, E, Information Security Governance within the e-Learning Environment, TLC Conference 2006, Cancun, Mexico, March 20-24, 2006.


Published in the Electronic Proceedings of the Conference.


Von Solms, SH, Kritzinger, E-learning – Incorporating Information Securiy Governance, InSite Conference 2006, Manchester, UK, 25-28 June 2006, Published in the Electronic Proceedings of the Conference.


E Marais, Argyles, D, von Solms, SH, ‘Identifying and Protecting eLearning Systems from corrupt use and plagiarism’, 3rd International Conference on for the Knowledge-based Society, Bangkok, Thailand, 3-4 August 2006, Published in the Proceedings.


E Marais, Argyles, D, von Solms, SH (L), ‘Security issues specific to E-assessments’, 8th Annual Conference on WWW Applications, Bloemfontein, 6-8 September, 2006 , Published in the electronic Conference Proceedings.


von Solms SH (L), ‘ICT Risk Governance in a University Environment’, CITTE Conference, 19-20 September, Pretoria, Published in the electronic Conference Proceedings.


von Solms SH, ‘What every Vice-Chancellor and Council Members should know about the use of ICT’, CITTE Conference, 18-20 September 2006, Pretoria, Published in the electronic Conference Proceedings.


CJ Eibl, SH von Solms, S Schubert, ‘A Framework for Evaluating the Information Security of E-Learning Systems’, 2nd International Conference on Information in Secondary Schools : Evolution and Perspectives (ISSEP 2006), Vilnius, Lithuania, 7-11 November 2006, Published in the Conference Proceedings.


Reekie C, von Solms SH, ‘A Corporate Protection and Assurance Model‘,International Workshop on Information Security, 29 Oct – 3 November 2006, Montpellier, France, Published in Lecture Notes in Computer Science (LNCS), Vol 4277, November 2006, Springer.


von Solms, SH, ‘Information Security – the Fourth Wave‘, Computers and Security, 2006, Vol 25, Nr 6, pp 165 - 168
von Solms, SH, von Solms, R, ‘ Information Security Governance : A model based on the Direct-Control Cycle, Computers and Security, 2006, Vol 26, 6, pp 408-412.


Von Solms R, von Solms SH, ‘Information Security Governance : Due Care’, Computers & Security, 2006, Vol 25, Nr 7, pp 494 - 497.


von Solms, SH, Louwrens, C, ‘Chapter XI : The Relationship between Digital Forensics, Corporate Governance, IT Governance and IS Governance’,
in the book ‘Digital Crime and Forensic Science in Cyberspace’, Kanellis et al (Editors), IDEA Publishing Group, London, 2006, 339pp.





2005


Smith E, Kritzinger E, Oosthuizen HJ, Von Solms SH, 2005
‘Information Security Education – Bridging the Gap between Academic Institutions and Industry’
Proceedings of the IFIP TC 11 WG 11.8 4th World Conference on Information Security Education 2005, 18 – 20 May 2005, Moscow, Rusland, pp 45 – 51.


Von Solms, SH, Tait B, 2005
‘BioVault : Solving the problem of replay in Biometrics’
Proceedings of the 5th Conference on e-Commerce, e-Business and e-Government
28-30 Oktober 2005, Poznan, Pole.


Von Solms, SH, Hertenberger, M, 2005
‘ERPSEC – A Reference Framework to Enhance Security in ERP Systems’
Proceedings of the IFIP TC 11 20th International Security Conference
30 May – 1 June 2005, Chiba, Japan, pp 79 – 89.


Von Solms, SH, 2005
‘Information Security Governance in ICT Based Educational Systems’
Proceedings of the 4th International Conference on ICT and Higher Education
28-30 September 2005, Bangkok, Thailand, pp 109 – 119.


Janiszyn, Darek, Von Solms, SH, 2005
“A more secure e-commerce environment based on a self-contained biometric USB memory stick”
Electronic Proceedings of Information Security South Africa (ISSA) 2005
29 June – 1 July 2005, Johannesburg, South Africa, pp 1 – 10.


Du Preez, J, Von Solms, SH, 2005
“Personal Identification and Authentication by using “The way the heart beats””
Electronic Proceedings of Information Security South Africa (ISSA) 2005
29 June – 1 July 2005, Johannesburg, South Africa, pp 1 - 12.


Von Solms, SH (L), “ICT Research : Where are we going”, Electronic ITWeb, 2005.


Von Solms, SH (L), “ Professional Status for ICT students in SA?” Elektron, 2005.


Von Solms, SH, von Solms, R, 2005
‘From information security to ... business security?’
Computers Security, Vol 24, Nr 4, pp271 – 273.


Von Solms, SH, 2005
‘Information Security Governance – Compliance Management vs Operational Management’
Computers Security, Vol 24, Nr 6, pp441 - 447.


Von Solms, SH, 2005
‘Information Security Governance – COBIT or ISO 17700 or both?’
Computers Security, Vol 24, Nr 2, pp97 – 104.





2004


SH von Solms , MP Hertenberger ,
‘A case for information ownership in ERP systems’,
18th IFIP World Computer Conference,
Toulouse, France, Augustus 2004.


SH von Solms, E Kritzinger
‘Five non-technical pillars of network information security management’,
8th IFIP TC6/TC11 Conference on Communications and Multimedia Security,
Windermere, England, September 2004.


SH von Solms , E Kritzinger.
‘The NOKIS Model - A Model for Non-Technical Aspects of Information Security’,
The 10th International Conference on Information Systems Analysis and Synthesis: ISAS 2004 and International Conference on Cybernetics and Information Technologies,
Systems and Applications: CITSA 2004, Orlando, USA, July 2004.


SH von Solms, R von Solms,
‘Integrating information security into the undergraduate Syllabus’,
Microsoft Academic Days in Dubai,
Dubai, April 2004.


Grobler, T. [M], von Solms, S-H. [L]. 2004.
“Assessing the Policy Dimension”,
Proceedings of Information Security South Africa 2004, pp 13 (Abstract).
Full paper published on CD.


von Solms, S-H. [L], Marais E. [L]. 2004.
“From secure wired networks to secure wireless networks – what are the extra risks?”,
Proceedings of Information Security South Africa 2004, pp 47 (Abstract).
Full paper published on CD.


von Solms, S-H. [L]. 2004.
“Information Security Governance in an African context”,
Proceedings of the ICT Africa Investment Summit 2004.


von Solms, S-H. [L]. 2004.
“From secure wired networks to secure wireless networks – what else is needed?”,
Proceedings of the African WiFi Summit 2004.


Zaayman, P. [ ], Berndt A. [ ], von Solms S-H. [L].2004.
“Electronic Customer Relationship Management (e-CRM) solutions in the Small and Medium Enterprise (SME) sector in South Africa”,
Proceedings of the 16th Annual Conference of the SA Institute of Management Scientists.


von Solms R. [Z]. von Solms S-H. [L].
“From Policies to Culture”,
Computers & Security, 23, pp275 – 279.


von Solms S-H. [L]. von Solms R. [Z].
“The 10 deadly sins of information Security”,
Computers & Security, 23, pp371 – 376.





2003


Tait, BL, Von Solms, SH
‘BioVault : Using Biometrics in Electronic Commerce’
Proceedings of ISSA 2003, July 2003, p 271.


Papanicolau, N (M), Von Solms, SH
‘A New approach to using Biometrics in Electronic Commerce’
Proceedings of ISSA 2003, July 2003, p 349.


Venter, D (M), Von Solms SH
‘An Information Security Management System’
Proceedings of ISSA 2003, July 2003, p 325.


Von Solms, SH
‘Identity Fraud – the real issues’
e-Secure, Vol 5, Nr 8, Sept 2003, p 22.


Von Solms, SH
‘Information Technology Governance and IT Risks’
Financial Mail, May 2003.


Von Solms, SH
‘Measuring Information Security'
Business IT Alignment Conference, July 2003, Johannesburg.


Von Solms, SH
'IT Enterprise Information Security’
IGNITE Conference, August 2003, Sun City.


Pretorius E. [M]. von Solms S-H. [L]. 2003
“Information Security Governance using ISO 17799 and CobiT”,
Proceedings of the 6th IFIP TC11/WG 11.5 Working Conference on Integrity and Internal Control in Information Systems,
Kluwer Academic Press, pp 107 – 114.





2002


Von Solms SH
‘Enforcing your Organizational IT Security Policies’
Proceedings of The Conference on IT Policies, Johannesburg, 25 June 2002.


Von Solms SH
‘Information Security Management Systems’
Proceedings of The Conference on IT Policies, Johannesburg, 25 June 2002.


Von Solms SH
‘Corporate and Information Security Governance’
Proceedings of ISSA 2002, Misty Hills, July 2002.


Von Solms SH
‘Information Security Governance’
Proceedings of the Conference on Secure IT, Johannesburg, August 2002.


Von Solms SH
‘IT Research in SA’
Proceedings of the 2002 SAICIT Conference, Port Elizabeth, Sept 2002.


Von Solms SH
‘The Information Security implications of the ECT Act’
Proceedings of the TEL.COM Conference, Oct 2002, Johannesburg.


Von Solms SH
‘Information Security Governance’
Proceedings of the Workshop on Corporate Governance, Nov 2002, Johannesburg.


Von Solms SH
‘e-Commerce Base Technologies’
Proceedings of the SA-INDO Workshop, Nov 2002, Pretoria.


Von Solms SH
‘Information Security in Government – Requirements on the Strategic and Operational level’
Proceedings of the Forum on Technology in Government, Dec 2002, Johannesburg.





2001


Eloff MM, von Solms SH
‘Information Security Management : An Approach to combine Process Certification, and product Certification’,
Computers and Security, Vol 19, pp 698 – 709.


Von Solms, R, von Solms SH
‘Incremental Information Security Certification’
Computers and Security, Vol 19, p 615 - 620.


Von Solms SH
‘Corporate Governance and Information Security’
Computers and Security, Vol 20, p 215 – 218.


Von Solms SH
‘Information Security – A multi-dimensional Discipline’
Computers and Security, Vol 20, p 504 – 508.


Von Solms, SH
‘The Implementation of an Information Security Governance Structure for ESKOM – the national electricity utility of SA’
18th World Conference on Computer Security, Audit and Control, 2001, London.





2000


Von Solms, SH
"Information Security Management: The Road Ahead"
InfoSec Africa, 23-24 February 2000, Johannesburg.


Von Solms, SH
"Best Practices for Information Security"
Strategic Business-to-Business E-commerce Conference, 10-12 May 2000, Johannesburg.


Von Solms, SH
"Managing Information Security Using Internation Best Practices"
IGNITE 2000, 9-11 August 2000, Sun City.


Von Solms, SH
"Key Development of the BSI's BS17799 and Code of Practice for Information Security Managing in SA"
Managing IT Security Conference, 14-15 August 2000, Johannesburg.


Geldenhuys, JHS, & Von Solms, SH
"MOSAIC: A Model for Secure Anonymous Internet Communication"
International Academic Publishers Proceedings of the 16th IFIP TC 11 Conference on Information Security, pp 217-223, Beijing, China, Aug 22-24, 2000.


Tait, BL, & Von Solms, SH
"Biometric Single Sign-on: Ah Authenticating Server Approach"
International Academic Publishers Proceedings of the 16th IFIP TC 11 Conference on Information Security, pp 1-4, Beijing, China, Aug 22-24, 2000.


Rossudowska, A
"The Enterprise-Wide Electronic Business (EWEB) Model-An Electronic Business (EB) Solution"
Proceedings of the 16th Word Computer Conference, Beijing, China, Aug 22-24, CD-ROM, ISBN 7-900049-66-5/TP.66, 2000.


Louwrens, CP, & Von Solms, SH
"DNA-proofing for Computer Systems-A New Approach to Computer Security?"
Kluver Acodemic Publishers Proceedings of the 16th IFIP TC 11 Conference on Information Security, pp 121-130, Beijing, China, Aug 22-24, 2000.


Von Solms, E, & Von Solms, SH
"Information Security Management Through Measurement"
Kluver Academic Publishers Proceedings of the 16th IFIP TC 11Conference on Information Security, pp 59-68, Beijing, China, Aug 22-24, 2000.


Eloff, MM, & Von Solms, SH
"Information Security: Process Evaluation nad Product Evaluation"
Kluver Academic Publishers Proceedings ofthe 16th IFIP TC 11 Conference on Information Security, pp 11-18, Beijing, China, Aug 22-24, 2000.


Von Solms, SH
"Information Security Certification"
IT Security Management for Effective E-commerce Conference, 2-4 October 2000, Johannesburg.


Von Solms, SH
"Best Practices for Information Security Managemment"
ISEC Africa 2000, 8-11 November 2000, Johannesburg.


Von Solms, SH
"Information Security-The Third Wave"
Computers & Security, Vol 19, No 7, pp 615-620, 2000.


Eloff, MM, & Von Solms, SH
"Information Security Management: A Hierarchical Framework for Various Approaches" Computers & Security, Vol 19, No 3, pp243-256, 2000.





1999


Von Solms, SH
"Digital Certificates and Cirtification Authorities in Electronic Commerce"
International Conference on Information Technology, Kuala Lumpur, Malaysia, 9-10 September 1999.


Von Solms, SH, & Eloff, JHP
"Designing and Maintaining Secure Software Systems"
InfoSec Africa '99, 2-4 February 1999.


Von Solms, SH
"Information Security Benchmarking"
Information Security 1999, 27-29 July 1999, Johannesburg.


Von Solms, SH
"Secure Electronic Transactions"
Sun Conference, 12-13 October 1999, Johannesburg.


Von Solms, SH
"Information Security Certification and Benchmarking"
Sun Conference, 12-13 October 1999, Johaneesburg.


Von Solms, SH
"Information Security Management Certification According to BS"
Conference on IT Security Management, 3-5 November 1999, Johannesburg.


Von Solms, SH
"Information Security Management Through Measurement"
iSec99, 10-12 November 1999, Johannesburg.


Von Solms, SH
"The World Wide Web and Security Electronic Commerce"
Encyclopedia of Telecommunications, Vol 18, pp 237-258, 1999.


Geldenhuys, JHS & Von Solms, SH
"Managing Multilevel Security in a Military Internet Environment"
Computers & Security, Vol 18, No 3, pp 257-270, 1999.


Von Solms, S.H., Geldenhys, J.H.S.
"Managing Multi Level Security in a Military intranet Environment"
Computers & Security Vol 18,No 3, p257, 1999.


Von Solms, S.H
"The World Wide Web and Secure Electronic Commerce"
The Froehlich/Kent ENCYCLOPEDIA OF TELECOMMUNICATIONS, Vol 18,pp237, Marcel Dekker, 1999.





1998


Louwrens, CP, & Von Somls, SH
"Can Computerised Immunity be Achieved, Based on a Biological Model?"
Proceedings of the 14th International Conference on Information Security, Wene/Budapest, pp 240-250, Aug/Sept 1998.


Von Solms S.H., CP Louwrens [D]
"Can computerized immunity be achieved based on a biological model?"
Proceeding of IFIP/Sec98, Budapest, Hongaraye, 1998.


Von Solms, S.H.
"Information Security and Electronic Commerce"
Proceedings of IFIP/Sec98, Budapest, Hongarye, 1998.


Von Solms S.H.
"Information Security and Electronic Commerce"
Lisbon, Portugal, 1998..


Von Solms, SH
"Information Security and Electronic Commerce"
One day invited Tutorial at IFIP/Sec 98, Budapest, Hungary, September 1998.


Von Solms, SH
"Information Security and Electronic Commerce"
One day Invited Tutorial at Lisbon, Portugal, 11 September 1998.


Geldenhuys, JHS, & Von Solms, SH
"Collecting Security Baggage on the Internet"
Computers & Security, Vol 17, No 4, pp 337-345, 1998.


Van der Merwe, J, & Von Solms, SH
"Electronic Commerce with Secure Intelligent Trade Agents"
Computers & Security, Vol 17, No 5, pp 435-446, 1998.


Von Solms, S.H.
"Renaissance @ continent africa?"
Aambeeld, Jaargang 26, No 2, pp 31-33,1998.


Von Solms, S.H.
"Information Security - An overview"
Electron, Vol 15, No 5, pp63, 1998.





1997


Van Zyl, PWJ, & Von Solms, SH
"Roaming Security Agents Enabling Intelligent Access Control and Network Protection"
Proceedings of the 13th International Conference on Information Security, Copenhagen, pp 452-468, 1997.


Van Rensburg, A, & Von Solms, SH
"A Comparison of Schemes for Certification Authorities/Trusted Third Parties"
Proceedings of the 13th International Conference on Information Security, Copenhagen, pp 222-240, 1997.


Louwrens, CP, & Von Solms, HS
"Selection of Secure Sign-on Solutions for Heterogeneous Computing Environments" Proceedings of the 13th International Conference on Information Security, Copenhegen, pp 9-24, 1997.


Von Solms, SH
"Post-Graduate Research Seminar"
University of Prague, Pregue, November 1997.


Von Somls, SH
"SA-Germany Research Seminar"
Baden-Baden, Germany, Novermber 1997.


Von Solms, SH
"Post-Graduate Research Seminar"
University of Graz, Austria, Novermber 1997.


Van der Merwe, J, & Von Solms, SH
"Electronic Commerce with Security Intelligent Trade Agents"
Lecture Notes in Computer Science, Springer no 1334, pp 452-462, 1997.





1996


Von Solms, SH
"Information Security on the Superhighway"
Proceedings of IFIP/Sec '96, Samos, Greece, Chapman & Hall, pp 153-166, 1996.


Olivier, MS, Von Solms, J & Von Solms, SH
"MoFAC-A Model for Fine-Grained Access Control"
Proceedings of IFIP/Sec '96, Samos, Greece, Chapman & Hall, pp 295-305, 1996.


Von Solms, S.H.
"Information security in Medical Informatics."
Proceedings of HELINA 1996, the 2nd International Working Conference on Health Informatics in South Africa.


Von Solms, S.H.
"Use of the Internet and WWW in Medical Informatics."
Proceedings of HELINA 1996, the 2nd International Working Conference on Health Informatics in South Africa.


Von Solms, S.H., Olivier, MS., Von Solms, J. (Magister student)
"MoFAC – A Madel for fine-Grained Access Control."
Proceedings of IFIP/Sec 1996, Samos Greece, Chapman & Hall.


Von Solms, SH
"Digital Signatures"
Computer Society of South Africa, April 1996.


Von Solms, SH
"Information Security - The Family member who came home (Editorial)"
South African Computer Journal, Vol 17, pp 1-3, Sept 1996.


Von Solms, S.H.
"Information security on the Electronic Superhighway."
South African Computer Journal. Vol. 17, 1996.





1995


Von Solms, S.H., Pottas, D. (Ph.D. student).
"Aligning Information Security Profiles with Organisational Policies."
Proceedings of IFIP/Sec 95. Cape Town, South Africa, 1995.


Von Solms, S.H., Von Solms, R., Calitc, M. (Magisterstudent)
" Information Security Management in a Distributed Open Enviroment."
Proceedings of IFIP/Sec 95. Cape Town, South Africa, 1995.


Von Solms, S.H., Naccache, D.
"On Blind Signatures and Perfect Crimes."
In Buildings in Big Brother – The Cryptography Policy Debate. Edited by Lance Hoffman. Springer-verslag, 1995.


Von Solms, S.H.
"Security on the World Wide Web."
Proceedings of Security on the Internet Seminar. London, England, 1995.


Von Solms, S.H. & Mostert, D. (Ph.D.student)
"A Technique to Include Computer Security Safety and Resilience Requirements as part of the Requirements Specification"
The Journal of Systems & Software, Vol. 13 No 1, 1995.





1994


Von Solms, S.H., Van Zyl, P.W. (Ph.D.student), Olivier M.S.
"Moss 2: A Model for Open System Security"
Accepted for Presentation at IFIP/Sec'94, Curacao, May 1994.
(Published in the official proceedings).


Von Solms, S.H., Van der Merwe, I.
"The management of Computer Security Profiles using a role oriented approach."
Computers & Security, Vol. 13, No 8, 1994.


Von Solms, S.H., Mostert, D.N.J. (Ph.D. student)
"Methodology to Include Computer Security, Safety and Resilience as Part of User Requirements"
Computers & Security, Vol. 13, 3, 1994.


Von Solms, S.H., & von Solms R. (Ph.D.student), H. de Haar, W.J. Caelli
"A Framework for Information Security Evaluation"
Information & Management, 26, (1994), 143 - 153.


Von Solms, S.H., Olivier, M.S. (Ph.D.student)
"A Taxonomy for Secure Object-Oriented Databases"
(ACM Transactions on Database Systems, Vol. 19, No. 1, (1994)).





1993


Von Solms, S.H., Pottas, D. (Ph.D.student)
"Superseding Manual Generation of Access Control Specification: From Policies to Profiles"
IFIP/Sec'93, The 9th International Conference on Information Security, Toronto, Canada, May 1993.
(Published in the official proceedings).


Von Solms, S.H., Du Toit, L. (M-student)
"A Model for Information Security Documentation"
IFIP/Sec'93, The 9th International Conference on Information Security, Toronto, Canada, May 1993.
(Published in the official proceedings).


Von Solms, S.H., Von Solms, R. (Ph.D.student) & Carroll, J.
"A Process-oriented Approach to Information Security Management"
IFIP/Sec'93, The 9th International Conference on Information Security, Toronto, Canada, May 1993.
(Published in the official proceedings).


Von Solms, S.H. & Pottas, D. (Ph.D.student)
"The Automatic Generation of Information Security Profiles."
Accepted for presentation at COMPSEC '93, The 10th World Conference on Computer Security, Audit & Control, October 1993, London, U.K.
(Published in the official proceedings).


Von Solms, S.H. & Mostert D. (Ph.D.student)
"Integrating Computer Security, Safety and Resilience into User Requirements."
Accepted for presentation at COMPSEC'93, The 10th World Conference on Computer Security, Audit & Control, October 1993, London, U.K.
(Published in the official proceedings).


Von Solms, S.H. and Mostert, D. (Ph.D.student)
"A Methdology to include Security, Safety and Resilience into User Requirements."
CSESAW Conference, Washington, U.S.A., July, 1993.


Von Solms, S.H., Von Solms, R. (Ph.D. student), Caelli, W.J.
"A Model for Information Security Management"
Information Management & Computer Security, Vol. 1, No.3, 1993.





1992


Von Solms, S.H., Olivier, M.S. (Ph.D.student)
"DISCO - A Discretionary Security Model for Object-Oriented Databases"
8th International Conference on Information Security (IFIP/SEC '92) Singapore, 1992.
(Published in the official proceedings of the conference, pp 375 - 388).


Von Solms, S.H., Pottas, D. (Ph.D.student)
"MAPS - A Model for Automated Profile Specification"
8th International Conference on Information Security (IFIPSEC'92), Singapore, 1992.
(Published in the official proceedings of conference, pp 131 - 146)


Von Solms, S.H., Von Solms, R. (Ph.D.student), Caelli, W.J.
"A Model for Information Security Management"
TC 11.1 Workshop in INFOSEC, Singapore, 1992.
(Publishes in Notes on Information Security Management, to appear).


Von Solms, S.H., Van Zyl, P.W.J. (Ph.D.student)
"MOSS - A Model for Open Systems Security"
UNIFORUM ASIA 1992 International Conference, Singapore, August 1992
(Published in the official proceedings of the conference).


Von Solms, S.H., Olivier, M.S.
"Building a Secure Database Using Self-Protecting Objects"
Computers and Security, Vol. 11, 1992, pp 259 - 271.





1991


Von Solms, S.H., Boshoff, W. (Ph.D.student)
"A New Formal Model for Controlling Security in Multi-Domained Computer Environments"
7th International Conference on Information Security (IFIP/SEC'90), Brighton, England, 1991.
(Published in the official proceedings of the conference).


Von Solms, S.H.
"Information Security - A Management Perspective."
LESTA'91, International Conference on IT, Maseru, Lesotho, April 1991.


Von Solms, S.H., Pottas, D. (M-student)
"A Computerized Management Reporting aid for a Mainframe Security System"
Computers and Security, Vol. 10, 1991, pp 653 - 660.





1990


Von Solms, S.H., Eloff, J.H.P. & Von Solms, R.(M-student)
"Computer Security Management: A Framework for Effective Management Control"
Information Age, Vol. 12, 4, 1990, pp 217 - 222.


Von Solms, S.H. Boshoff W. (Ph.D.student)
"The Application of a Path Context Approach to Computer Security Fundamentals"
Information Age, vol. 12, 2, 1990,, pp 83 - 90.





1989


Von Solms, S.H., Edwards, N.G. (M-student)
Designing and Implementing a New Security Model"
Inter. Journal of Comp. Math., Vol. 29, 1989, pp 139 - 149.


Von Solms, S.H., Boshoff, W. (Ph.D.student)
"A Path context Model for Addressing Security in a Potentially non-Secure Environment"
Computers & Security, Vol. 8, 1989, pp 417 - 425.





1988


Von Solms, S.H., De Villiers, D.P. (M-student)
"A Context-Sensitive Security Model"
SECURICOM'88: 6th World-Wide Conference on Computer Security, Paris, France, 1988.
(Published in the official proceedings of the conference).




© University of Johannesburg | 2018
Last updated | 30 July 2018