Basie Von Solms
Professor
Official Website
PhD Students
Home
Research Output
Biography
IFIP Activities
Consulting
PhD Students
Contact Details
PhD Students
F Blauw (2020) :
Maxima: A Model for Constructing an Online Identity Model of a User Using Identity Fragments.
T van der Walt (2019) :
A Model for Political Corporate Governance of ICT in South Africa’.
CP Duvenage (2019) :
A Conceptual Framework for Cyber Counterintelligence’.
P Jacobs (2019) :
A National Cybersecurity Management Framework for Developing Countries.
VJ Jaquire (2018) :
A Framework for a Cyber Counterintelligence Maturity Model.
R de Bruin (2018) :
A Maturity Framework for Cyber Security Governance.
C Louw (2017) :
Towards a Smartphone Application User Security Competency Evolution Model.
MR Corregedor (2017) :
An Architecture for Anti-malware Protection based on Collaboration.
N Veerasamy (2014) :
CLC- Cyberterrorism Life Cycle Model.
DT van der Haar (2014) :
Collective Human Biological Signal-based Identification and Authentication in Access Control Environments.
D Ellefsen (2012) :
Critical Information Infrastructure Protection for Developing Countries.
T Grobler (2012) :
DFMF – A High-level Integrated Digital Forensics Framework.
A Tolnai (2012) :
A Security Model for a Virtualized Information Environment.
MM Grobler (2010) :
Liforac: A Model for Live Forensic Acquisition.
BL Tait (2009) :
Biovault: A protocol to prevent replay in biometric systems.
MP Hertenberger (2005) :
A Reference framework for security in enterprise resource planning systems.
MM Eloff (2000) :
A Multi-dimensional model for information security management.
CP Louwrens (2000) :
A Model for computer security based on a biological immune system.
J van der Merwe (1999) :
Information Security using Intelligent Software Agents.
JHS Geldenhuys (1999) :
MOSAIC Model for secure anonymous Internet Communication.
PWJ van Zyl (1998) :
MOSS: A Model for open system security.
D Pottas (1996) :
The automatic generation of information security profiles.
DNJ Mostert (1995) :
Integrating computer security, safety and resilience into user requirements.
R von Solms (1993) :
Information Security Management: Processes and Metrics.
MS Olivier (1992) :
Secure object-oriented databases.
WH Boshoff (1990) :
A Path context model for computer security phenomena in potentially non-secure environment.
EC Anderssen (1989) :
‘n Rekenaargebasseerde model vir die voorstelling van tyd-ruimtelike aspekte met verwysing na historiese veldslae.
E Mulder (1989) :
Formalising the object-oriented paradigm using automata theory.
PG Mulder (1989) :
Using Formal language in data communications protocols.
EM Ehlers (1987) :
A Hierarchy of Random Context Grammars and Automata.
JHP Eloff (1985) :
Die ontwikkeling van 'n spesifikasietaal vir 'n rekenaarsekuriteitstelsel.
© University of Johannesburg | 2022
Last updated | 09 November 2022