Marijke Coetzee

Orcid: 0000-0002-9157-3079

Affiliations:
  • University of Johannesburg


According to our database1, Marijke Coetzee authored at least 48 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Access Control in Cyber-Physical Spaces Using Virtual Perimeters.
Proceedings of Sixth International Congress on Information and Communication Technology, 2021

Digital Twin Monitoring for Cyber-Physical Access Control.
Proceedings of the Emerging Information Security and Applications, 2021

2020
Simultaneous Deauthentication of Equals Attack.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

2019
An Aviation Sector CSIRT for Sub-Saharan Africa.
Proceedings of the Information and Cyber Security - 18th International Conference, 2019

Development Activities, Tools and Techniques of Secure Microservices Compositions.
Proceedings of the Information Security Practice and Experience, 2019

A Comparison of Indoor Positioning Systems for Access Control Using Virtual Perimeters.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Software Development Activities for Secure Microservices.
Proceedings of the Computational Science and Its Applications - ICCSA 2019, 2019

2018
Access Control Requirements for Physical Spaces Protected by Virtual Perimeters.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

The Design of an Identity and Access Management Assurance Dashboard Model.
Proceedings of the Research and Practical Issues of Enterprise Information Systems, 2018

CaseRank: Ranking case law using precedent and principal component analysis.
Proceedings of the 2018 Conference on Information Communications Technology and Society (ICTAS), 2018

2017
Access control for secure information sharing in smart content spaces.
J. Inf. Secur. Appl., 2017

2016
Engineering Secure Adaptable Web Services Compositions.
Proceedings of the CONF-IRM 2016, 2016

SmartNet: Secure Content Sharing for Peer-to-Peer Smart Group Spaces.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
The Design of a Configurable Reputation Service.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Introduction.
Proceedings of the 2015 Information Security for South Africa, 2015

AFA-RFID: Physical layer authentication for passive RFID tags.
Proceedings of the 2015 Information Security for South Africa, 2015

Access control for local personal smart spaces.
Proceedings of the 2015 Information Security for South Africa, 2015

2014
TrustCV: Reputation-based trust for collectivist digital business ecosystems.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Argumentation-Based Group Decision Support for Collectivist Communities.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Introduction.
Proceedings of the 2013 Information Security for South Africa, 2013

Towards Reputation-as-a-Service.
Proceedings of the 2013 Information Security for South Africa, 2013

Context-aware RESTful services on mobile devices.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Towards a generic Identity and Access Assurance model by component analysis - A conceptual review.
Proceedings of the First International Conference on Enterprise Systems: ES 2013, 2013

2012
Towards trust and reputation for e-commerce in collectivist rural Africa.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

Towards a Holistic Information Security Governance Framework for SOA.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures.
Proceedings of the Information Security South Africa Conference 2011, 2011

Towards Bluetooth multi-hop messaging.
Proceedings of the AFRICON 2011, 2011

Web Services Security Policy Assertion Trade-offs.
Proceedings of the Sixth International Conference on Availability, 2011

Information Security for Service Oriented Computing: Ally or Antagonist.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Considering web services security policy compatibility.
Proceedings of the Information Security South Africa Conference 2010, 2010

Towards an Information Security Framework for Service-Oriented Architecture.
Proceedings of the Information Security South Africa Conference 2010, 2010

A Web Services security policy assistant.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
An Analysis of Authentication for Passive RFID Tags.
Proceedings of the Information Security South Africa Conference 2009, 2009

A Framework for Web Services Security Policy Negotiation.
Proceedings of the Information Security South Africa Conference 2009, 2009

Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks.
Proceedings of the Information Security South Africa Conference 2009, 2009

2008
The Information Security of a Bluetooth-Enabled Handheld Device.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

Analogue Fingerprinting for Passive RFID Tags.
Proceedings of the 2008 Third International Conference on Broadband Communications, 2008

BlueTrust in a Real World.
Proceedings of the The Third International Conference on Availability, 2008

2007
Web services access control architecture incorporating trust.
Internet Res., 2007

A Trust and Context Aware Access Control Model for Web Services Conversations.
Proceedings of the Trust, 2007

2006
A Framework for Web Services Trust.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2005
Autonomous trust for web services.
Internet Res., 2005

An access control framework for web services.
Inf. Manag. Comput. Security, 2005

Metadata for trust in service-oriented architectures.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

2004
Towards Web Service access control.
Comput. Secur., 2004

A Logic-Based Access Control Approach For Web Services.
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June, 2004

2002
Secure Database Connectivity on the WWW.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Secure Database Connectivity On The WWW.
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 2002


  Loading...