Sebastiaan H. von Solms

Orcid: 0000-0003-3586-6632

According to our database1, Sebastiaan H. von Solms authored at least 103 papers between 1973 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The impact of COVID-19 on cybersecurity awareness-raising and mindset in the southern African development community (SADC).
Electron. J. Inf. Syst. Dev. Ctries., July, 2023

Another Look at Cybersecurity Awareness Programs.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise.
Comput. Secur., 2022

South Africa's Taxi Industry as a Cybersecurity-Awareness Game Changer: Why and How?
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022

2021
A Cybersecurity Guide for Using Fitness Devices.
CoRR, 2021

2019
Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework.
Int. J. Cyber Warf. Terror., 2019

Reviewing National Cybersecurity Awareness for Users and Executives in Africa.
CoRR, 2019

2018
Cybersecurity and information security - what goes where?
Inf. Comput. Secur., 2018

Towards Collecting and Linking Personal Information for Complete Personal Online Identity Modelling.
Proceedings of the Human-Computer Interaction. Theories, Methods, and Human Issues, 2018

2015
A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare.
Int. J. Cyber Warf. Terror., 2015

Towards a Smartphone User Competency Evolution Model.
Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, 2015

Modelling Cyber Security Governance Maturity.
Proceedings of the 2015 IEEE International Symposium on Technology and Society, 2015

2013
Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks.
Proceedings of the SECRYPT 2013, 2013

Personally identifiable information leakage through online social networks.
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013

Windows 8 32 bit - Improved security?
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013

2012
ATE: Anti-malware technique evaluator.
Proceedings of the 2012 Information Security for South Africa, 2012

Implementing Critical Information Infrastructure Protection Structures in Developing Countries.
Proceedings of the Critical Infrastructure Protection VI, 2012

2011
Implementing Rootkits to Address Operating System Vulnerabilities.
Proceedings of the Information Security South Africa Conference 2011, 2011

Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed?
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2011

2010
Cyber security for home users: A new way of protection through awareness enforcement.
Comput. Secur., 2010

The 5 Waves of Information Security - From Kristian Beckman to the Present.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Securing the Internet: Fact or Fiction?
Proceedings of the Open Research Problems in Network Security, 2010

A Biometrics-Based Solution to Combat SIM Swap Fraud.
Proceedings of the Open Research Problems in Network Security, 2010

Critical Information Infrastructure Protection in the Developing World.
Proceedings of the Critical Infrastructure Protection IV, 2010

A Virtualized Environment Security (VES) model for a secure virtualized environment.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

The Cloud's Core Virtual Infrastructure Security.
Proceedings of the Global Security, Safety, and Sustainability, 2010

C-SAW: Critical Information Infrastructure Protection through Simplification.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

Securing the Cloud's Core Virtual Infrastructure.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Managing Some Security Risks Related to the Deployment of Multifarious Authentication and Authorization in a Virtualized Environment.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations.
Proceedings of the ARES 2010, 2010

A Multi-component View of Digital Forensics.
Proceedings of the ARES 2010, 2010

2009
BioVault: biometrically based encryption.
Int. J. Electron. Secur. Digit. Forensics, 2009

Modelling Live Forensic Acquisition.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

A Best Practice Approach to Live Forensic Acquisition.
Proceedings of the Information Security South Africa Conference 2009, 2009

Solving security issues using Information Security Awareness Portal.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Is the Information Security King Naked?.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2007
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content.
Proceedings of the New Approaches for Security, 2007

BASE: a Proposed Secure Biometric Authentication System.
Proceedings of the Policies and Research in Identity Management, 2007

Investigating and Comparing Multimodal Biometric Techniques.
Proceedings of the Policies and Research in Identity Management, 2007

2006
Information security governance: Due care.
Comput. Secur., 2006

Information Security Governance: A model based on the Direct-Control Cycle.
Comput. Secur., 2006

Information Security - The Fourth Wave.
Comput. Secur., 2006

A Corporate Capital Protection and Assurance Model.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Control Framework for Digital Forensics.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

2005
From information security to ... business security?
Comput. Secur., 2005

Information Security Governance - Compliance management vs operational management.
Comput. Secur., 2005

Information Security governance: COBIT or ISO 17799 or both?
Comput. Secur., 2005

ERPSEC - A Reference Framework to Enhance Security in ERP Systems.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Biovault: Solving the Problem of Replay in Biometrics.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

2004
The 10 deadly sins of information security management.
Comput. Secur., 2004

From policies to culture.
Comput. Secur., 2004

From secure wired networks to secure wireless networks - what are the extra risks?
Comput. Secur., 2004

A Case For Information Ownership in ERP Systems.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Five Non-Technical Pillars of Network Information Security Management.
Proceedings of the Communications and Multimedia Security, 2004

2003
Information Security Governance using ISO 17799 and COBIT.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

2001
Incremental Information Security Certification.
Comput. Secur., 2001

Information Security - A Multidimensional Discipline.
Comput. Secur., 2001

Corporate Governance and Information Security.
Comput. Secur., 2001

Information Security: Mutual Authentication in E-Commerce.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

2000
Information Security - The Third Wave?
Comput. Secur., 2000

Information Security Management: An Approach to Combine Process Certification And Product Evaluation.
Comput. Secur., 2000

Information Security Management: A Hierarchical Framework for Various Approaches.
Comput. Secur., 2000

Information Security Management Through Measurement.
Proceedings of the Information Security for Global Information Infrastructures, 2000

"DNA-proofing" for Computer Systems - A New Approach to Computer Security?
Proceedings of the Information Security for Global Information Infrastructures, 2000

Information Security: Process Evaluation and Product Evaluation.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Managing multi level security in a military intranet environment.
Comput. Secur., 1999

1998
Collecting security baggage on the internet.
Comput. Secur., 1998

Electronic commerce with secure intelligent trade agents.
Comput. Secur., 1998

1997
Roaming security agents enabling intelligent access control and network protection.
Proceedings of the Information Security in Research and Business, 1997

A comparison of schemes for certification authorities/trusted third parties.
Proceedings of the Information Security in Research and Business, 1997

Selection of secure single sign-on solutions for heterogeneous computing environments.
Proceedings of the Information Security in Research and Business, 1997

Electronic commerce with secure intelligent trade agent.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
MoFAC: a model for fine-grained access control.
Proceedings of the Information Systems Security, 1996

Information security on the electronic superhighway.
Proceedings of the Information Systems Security, 1996

1995
A technique to include computer security, safety, and resilience requirements as part of the requirements specification.
J. Syst. Softw., 1995

1994
A Taxonomy for Secure Object-Oriented Databases.
ACM Trans. Database Syst., 1994

A framework for information security evaluation.
Inf. Manag., 1994

The management of computer security profiles using a role-oriented approach.
Comput. Secur., 1994

A methodology to include computer security, safety and resilience requirements as part of the user requirement.
Comput. Secur., 1994

1993
A Model for Information Security Management.
Inf. Manag. Comput. Secur., 1993

A Model for Organising Information Security Documentation.
Proceedings of the Computer Security, 1993

A Process Approach to Information Security Management.
Proceedings of the Computer Security, 1993

Superseding Manual Generation of Access Control Specification - From Policies to Profiles.
Proceedings of the Computer Security, 1993

1992
The implementation of a protocol using automata.
Inf. Sci., 1992

On blind signatures and perfect crimes.
Comput. Secur., 1992

Building a secure database using self-protecting objects.
Comput. Secur., 1992

MAPS - Model for Automated Profile Specification.
Proceedings of the IT Security: The Need for International Cooperation, 1992

DISCO - A Discretionary Security Model for Object-oriented Databases.
Proceedings of the IT Security: The Need for International Cooperation, 1992

1991
Random context structure grammars and automata--a formal approach.
Inf. Sci., 1991

A computerized management reporting aid for a mainframe security system.
Comput. Secur., 1991

1989
A methodology for measuring user satisfaction.
Inf. Process. Manag., 1989

Using Random Context Structure Grammars to Represent Chemical Structures.
Inf. Process. Lett., 1989

A path context model for addressing security in potentially non-secure environments.
Comput. Secur., 1989

1988
On Using an Abstract Model of Distributed Database Concurrency Control Methods.
Comput. J., 1988

1987
A hierarchy of random-context grammars and automata.
Inf. Sci., 1987

1980
Random Context Array Grammmars.
Proceedings of the Information Processing, Proceedings of the 8th IFIP Congress 1980, Tokyo, Japan - October 6-9, 1980 and Melbourne, Australia, 1980

1978
Rewriting systems with a clocking mechanism.
Inf. Sci., 1978

Priorities on context conditions in rewriting systems.
Inf. Sci., 1978

1976
Some Aspects of Random Context Grammars.
Proceedings of the GI - 6. Jahrestagung, Stuttgart, 29. September, 1976

1975
The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area
Inf. Control., March, 1975

On T0L Languages over Terminals.
Inf. Process. Lett., 1975

1973
The characterization of certain classes of languages in the context sensitive area by automata.
Proceedings of the 1. Fachtagung über Automatentheorie und Formale Sprachen, 1973


  Loading...