Sebastiaan H. von Solms
Orcid: 0000-0003-3586-6632
According to our database1,
Sebastiaan H. von Solms
authored at least 103 papers
between 1973 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
The impact of COVID-19 on cybersecurity awareness-raising and mindset in the southern African development community (SADC).
Electron. J. Inf. Syst. Dev. Ctries., July, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
2022
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise.
Comput. Secur., 2022
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022
2021
2019
Int. J. Cyber Warf. Terror., 2019
CoRR, 2019
2018
Towards Collecting and Linking Personal Information for Complete Personal Online Identity Modelling.
Proceedings of the Human-Computer Interaction. Theories, Methods, and Human Issues, 2018
2015
A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare.
Int. J. Cyber Warf. Terror., 2015
Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, 2015
Proceedings of the 2015 IEEE International Symposium on Technology and Society, 2015
2013
Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks.
Proceedings of the SECRYPT 2013, 2013
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013
2012
Proceedings of the 2012 Information Security for South Africa, 2012
Implementing Critical Information Infrastructure Protection Structures in Developing Countries.
Proceedings of the Critical Infrastructure Protection VI, 2012
2011
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed?
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2011
2010
Cyber security for home users: A new way of protection through awareness enforcement.
Comput. Secur., 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Open Research Problems in Network Security, 2010
Proceedings of the Open Research Problems in Network Security, 2010
Proceedings of the Critical Infrastructure Protection IV, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Global Security, Safety, and Sustainability, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Managing Some Security Risks Related to the Deployment of Multifarious Authentication and Authorization in a Virtualized Environment.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations.
Proceedings of the ARES 2010, 2010
2009
Int. J. Electron. Secur. Digit. Forensics, 2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2007
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content.
Proceedings of the New Approaches for Security, 2007
Proceedings of the Policies and Research in Identity Management, 2007
Proceedings of the Policies and Research in Identity Management, 2007
2006
Comput. Secur., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
2005
Comput. Secur., 2005
ERPSEC - A Reference Framework to Enhance Security in ERP Systems.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
2004
Comput. Secur., 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the Communications and Multimedia Security, 2004
2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
2000
Information Security Management: An Approach to Combine Process Certification And Product Evaluation.
Comput. Secur., 2000
Comput. Secur., 2000
Information Security Management Through Measurement.
Proceedings of the Information Security for Global Information Infrastructures, 2000
"DNA-proofing" for Computer Systems - A New Approach to Computer Security?
Proceedings of the Information Security for Global Information Infrastructures, 2000
Information Security: Process Evaluation and Product Evaluation.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Comput. Secur., 1999
1998
1997
Roaming security agents enabling intelligent access control and network protection.
Proceedings of the Information Security in Research and Business, 1997
A comparison of schemes for certification authorities/trusted third parties.
Proceedings of the Information Security in Research and Business, 1997
Selection of secure single sign-on solutions for heterogeneous computing environments.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
MoFAC: a model for fine-grained access control.
Proceedings of the Information Systems Security, 1996
Information security on the electronic superhighway.
Proceedings of the Information Systems Security, 1996
1995
A technique to include computer security, safety, and resilience requirements as part of the requirements specification.
J. Syst. Softw., 1995
1994
Comput. Secur., 1994
A methodology to include computer security, safety and resilience requirements as part of the user requirement.
Comput. Secur., 1994
1993
A Model for Organising Information Security Documentation.
Proceedings of the Computer Security, 1993
A Process Approach to Information Security Management.
Proceedings of the Computer Security, 1993
Superseding Manual Generation of Access Control Specification - From Policies to Profiles.
Proceedings of the Computer Security, 1993
1992
MAPS - Model for Automated Profile Specification.
Proceedings of the IT Security: The Need for International Cooperation, 1992
DISCO - A Discretionary Security Model for Object-oriented Databases.
Proceedings of the IT Security: The Need for International Cooperation, 1992
1991
Comput. Secur., 1991
1989
Inf. Process. Lett., 1989
Comput. Secur., 1989
1988
Comput. J., 1988
1987
1980
Random Context Array Grammmars.
Proceedings of the Information Processing, Proceedings of the 8th IFIP Congress 1980, Tokyo, Japan - October 6-9, 1980 and Melbourne, Australia, 1980
1978
1976
Proceedings of the GI - 6. Jahrestagung, Stuttgart, 29. September, 1976
1975
The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area
Inf. Control., March, 1975
1973
The characterization of certain classes of languages in the context sensitive area by automata.
Proceedings of the 1. Fachtagung über Automatentheorie und Formale Sprachen, 1973