Consultation to Industry
Publications - Journals
Publications - Conferences
Download Journal Papers
Professional Activities
Membership
Home

e-mail: eloff@cs.up.ac.za
telephone number: (012) 999-9100
Prof. Jan Eloff

Papers Published in Internationally Accredited Journals


2010 Da Veiga A., Eloff, J.H.P., 2010, A Framework and assessment instrument for Information Security Culture, in Computers & Security, 29(2), 196-207, March 2010
2010 Rossudowski, A.M., Venter, H.S,, Eloff, J.H.P., 2010, A Security Privacy Aware Architecture and Protocol for a Single Smart Card used for Multiple Services, Computers & Security, 29(4) 393-409, June 2010
2009 Dlamini, M., Eloff, J.H.P., Eloff, M.M., 2009, Information Security: The Moving Target, Computers & Security 28(3-4), pp. 189-198, May-June 2009, available online at http://dx.doi.org/10.1016/j.cose.2008.11.007
2009 Höne, K., Eloff, J.H.P., 2009, Information Security Governance: Business requirements and research directions, Corporate Ownership and Control Journal, Volume 7, Issue 1, Fall 2009 (Continued - 2)
2009 Modiba, F., Ketcha-Ngassam, E., Eloff, J.H.P., 2009, Information, Communication and Technology Usage by Women-Owned Small, Medium and Micro Enterprises in Gauteng, South Africa in The International Journal of Interdisciplinary Social Sciences, Volume 4, Issue 5, pp.159-172. August 2009
2009 Padayachee, K., Eloff J.H.P., 2009, Adapting Usage Control as a Deterrent to address the inadequacies of Access Controls in Computers & Security, Volume 28, Issue 7, pp 536-544, (October 2009)
2008 Bihina Bella, M., Eloff, J.H.P., Olivier, M.S., 2007, A fraud management system architecture for Next-Generation Networks, accepted for publication in Forensic Science International
2008 Da Veiga A., Eloff, J.H.P., A Framework for Information Security Culture, accepted for publication in Computers & Security.
2008 Dlamini, M., Eloff, J.H.P., Eloff, M.M., Information Security: The Moving Target, accepted for publication in Computers & Security
2008 Obiedkov, S., Kourie, D.G., Eloff, J.H.P., 2008, Building Access Control Models with Attribute Exploration, accepted for publication in Computers & Security.
2008 Li, Y., Venter, H.S., Eloff, J.H.P., 2008, Standardising Vulnerability Categories, Computers & Security, 27(3-4), 63-122 (May-June 2008).
2008 Lo, J.L.C., Bishop, J, Eloff, J.H.P., SMSSec: an end-to-end protocol for secure SMS, Computers & Security 27(5-6) 154-167
2007 Da Veiga A., Eloff, J.H.P., 2007, "An Information Security Governance Framework" accepted for publication in Information Systems Management.
2007 Coetzee, M., Eloff, J.H.P., 2007, Web services access control architecture incorporating trust, Internet Research, 17(3): 291-305, ISSN: 1066-2243, Emerald Group Publishing Limited
2007 Lo, J.L.C., Bishop, J, Eloff, J.H.P., SMSSec: an end-to-end protocol for secure SMS, accepted for publication in Computers & Security
2007 Da Veiga A., Eloff, J.H.P., 2007, Information security culture - validation of an assessment instrument, Southern African Business Review, 11(1): April 2007.
2006 Fei, B.K.L., Eloff, J.H.P., Olivier, M.S., Venter, H.S., 2006, The use of self-organising maps for anomalous behaviour, detection in a digital investigation, Forensic Science International, 162(1-3): Oct 33-37, Elsevier.
2006 Izadinia, V.D., Kourie, D.G., Eloff, J.H.P., 2006, Uncovering Identities: a study into VPN tunnel fingerprinting, Computers & Security, 25(2): March 97-105.
2006 Morkel, T., Eloff, J.H.P., Olivier, M.S., 2006, Using image steganography for decryptor distribution, Lecture Notes in Computer Science, 4277, LNCS - I, 322-330, Publisher Springer-Verlag Berlin/Heidelberg, ISSN: 03029743.
2006 Obiedkov, S., Kourie, D.G., Eloff, J.H.P., 2006, On Lattices in Access Control Models, Lecture Notes in Artificial Intelligence, LNAI 4068, 374-387, Edited by J.G. Carbonell & J. Siekmann, Subseries of Lecture Notes in Computer Science, Springer-Verlag Berlin, ISSN: 0302-9743.
2006 Wojcik, M., Eloff, J.H.P., Venter, H.S., 2006, Trust Model Architecture: Defining Prejudice by Learning, Lecture Notes in Computer Science, 4083, 182-191, Publisher Springer Berlin / Heidelberg, ISBN 978-3-540-37750-4.
2005 Izadinia, VD, Kourie, DG, Eloff, JHP, (2006) Uncovering Identities: a study into VPN tunnel fingerprinting, submitted for publication in Computers & Security
2005 Coetzee, M, Eloff, JHP (2005) Autonomous trust for Web Services, Submitted for publication in Journal of Internet Research
2005 Eloff, JHP, (2005) Can machines trust one another? Submitted for publication in Computers & Security
2005 Eloff J.H.P., Eloff M.M., (2005) Information Security Architecture, Accepted for publication in Computers Fraud & Security for publication
2005 Granova, A, Eloff, JHP, (2005) A legal overview of phishing, Computer Fraud & Security Volume 2005, Issue 7 , July 2005, Pages 6-11
2005 Coetzee, M, Eloff, JHP, (2005) An Access Control Framework for Web Services, Information Management and Computer Security, Vol. 13 No. 1, 2005, Emerald Group Publishing Limited, 0968-5227
2004 Venter, HS, Olivier, MS, Eloff, JHP, PIDS: A Privacy Intrusion Detection System, Internet Research, Vol. 14(5), pp 360-365, (ISSN 1066-2243)
2004 Granova A, Eloff, JHP, (2004) Identity Theft, Computer Fraud & Security, Vol. 2004, Issue 11, pp 7-11 (ISSN 1361-3723) Elsevier Advanced Technology
2004 Coetzee, M, Eloff, JHP, (2004) Towards Web Services Access Control, Computers & Security, Vol. 23 (7), pp 559-570 (ISSN 0167-4048)
2004 Venter, HS, Eloff, JHP (2004) Vulnerability forecasting-a conceptual model, Computers & Security, Vol. 23 (6), pp 489-497 (ISSN 0167-4048)
2003 Venter, HS, Eloff, JHP (2003), State of the art intrusion detection and vulnerability scanning, South African Computer Journal, SACJ 32, December 2003 (ISSN 1015-7999)
2003 Venter, HS, Eloff, JHP (2003), Evaluating Vulnerability Scanners Using Harmonised Vulnerability Categories, South African Computer Journal, SACJ 31, pp 40-45, December 2003 (ISSN 1015-7999)
2003 Johnston J, Eloff, JHP, Labuschagne L (2003), Security and human computer interfaces, Computers & Security Vol. 22 (8), pp 675-684, December 2003
2003 Eloff, JHP, Granova A, (2003) Computer Crime Case Analysis, Computer Fraud & Security Vol. 2003, Issue 10, pp 14-17 ISSN: 1361-3723, Elsevier Advanced Technology
2003 Venter HS, Eloff, JHP (2003) Assessment of Vulnerability scanner, Network Security, pp 11-16, February 2003, ISSN 1353-4858
2003 Venter HS, Eloff, JHP (2003) Taxonomy for Information security technologies, Computers & Security Vol. 22 (4), pp299-307
2002 Venter HS, Eloff, JHP (2002) Harmonising Vulnerability Categories, South African Computer Journal, No. 29, pp. 24 - 31
2002 Venter HS, Eloff JHP (2002) Vulnerabilities categories for intrusion detection systems Computers & Security, Vol. 21 (7), pp 617-619
2002 Botha, R., Eloff, J. (2002) An Access Control Architecture for XML documents in workflow environments, South African Computer Journal, No. 28, pp. 3 - 10
2002 Karin Hone, J.H.P. Eloff, (2002), What makes an Effective Information Security Policy? Network Security, Vol. 2002 (6), pp. 14- 16
2002 Karin Hone, J.H.P. Eloff, (2002), Information Security Policy - What do International Information Security Standards Say? Computers & Security, Vol. 21 (5), pp. 402 - 409
2002 Smith, E., Eloff, J.H.P. (2002) A Prototype for Assessing Information-Technology Risks in Health Care, Computers & Security, Vol. 21
2001 Botha, R., Eloff, J. (2001) A Framework for Access Control in Workflow Systems, Information Management and Computer Security, Vol. 9 No 3
2001 Botha, R., Eloff, J. (2001) Access Control in Document-centric Workflow Systems - An Agent-based Approach, Computers & Security, Vol. 20, No. 6, Elsevier
2001 Botha, R., Eloff, J. (2001) Separation of Duties for Access Control Enforcement in Workflow Environments IBM Systems Journal, Vol. 40, No. 3
2001 Perelson, S., Botha, R., Eloff, J. (2001) Separation of Duty Administration, South African Computer Journal, No 27, pp 64-69
2001 Smith, E., Eloff, J.H.P. (2001) A New Approach to Risk Management in the Health-Care Domain South African Computer Journal, No 27, pp 2-11
2001 Trompeter, C.M., Eloff, J. (2001) A Framework for the Implementation of Socio-ethical Controls in Information Security Computers & Security, Vol. 20, No. 5, pp 384 - 391
2000 Knorr, K., Stormer, H., Eloff, J.H.P. (2000) A Model for Security in Agent-based Workflows Informatik / Informatique No.6
2000 Labuschagne, L., Eloff, J.H.P. (2000) Electronic commerce: the information security challenge Information Management & Computer Security, Vol.8 (2&3)
2000 Smith, E, Eloff, J.H.P. (2000) Using cognitive fuzzy modeling for enhanced risk assessment in a health-care institution IEEE - Intelligent systems and their applications, Vol. 15 No.2, PP 69-75
2000 Venter, H., Eloff, J.H.P. (2000) Network Security: Important Issues Network Security, Vol. 6
1999 Eloff, J.H.P. & Prinsloo, J.J. (1999) Web Browsers: Information Security issues, Computer Fraud & Security November 1999, ISSN: 1361-3723, Elsevier Advanced Technology
1999 Smith, E, Eloff, J.H.P. (1999) Security in health-care information systems - current trends, International Journal of Medical Informatics Vol. 54, Issue 1
1998 Labuschagne, L. Eloff, J.H.P. (1998) The Use of Real-time Risk Analysis to Enable Dynamic Activation of Countermeasures Computer & Security Vol. 17, No. 4
1998 Labuschagne, L., Eloff, J.H.P. (1998) Real-time Risk Analysis using Java concepts Information Management and Computer Security Vol. 6, No. 5
1998 Van Buren, S., Eloff, J.H.P. (1998) Framework for evaluating security protocols in a banking environment Computer Fraud & Security ISSN 1361-3723, Elsevier
1998 Van der Merwe, G., Eloff, J.H.P. (1998) Software source code, visual risk analysis: an example Computers & Security Vol. 17, No. 3
1998 Venter, H.S., Eloff, J.H.P. (1998) Data Packet Intercepting on the Internet: How and Why? Computers & Security Vol. 17, No. 8
1997 Botha, R., Eloff, J.H.P., (2001) Information Security in a client/server environment, Elektron Vol. 14, No. 2
1997 De Ru, W.G., Eloff, J.H.P. (1997) Enhanced Password Authentication through Fuzzy Logic IEEE Intelligent Systems & their Applications Vol. 12, No. 6
1997 Labuschagne, L., Eloff, J.H.P. (1997) Improved System-Access Control Using Complementary Technologies Computers & Security Vol. 16, No. 6
1996 De Ru, W.G., Eloff, J.H.P. (1996) Reinforcing password authentication with typing biometrics South African Computer Journal Vol. 17
1996 De Ru, W.G., Eloff, J.H.P. (1996) Risk analysis modelling with the use of fuzzy logic Computers & Security, Vol. 15, No. 3
1996 Eloff, J.H.P., Holbein, R., Teufel S (1996) Security Classification for Documents Computers & Security Vol. 15, No. 1
1995 Booysen, H.A.S., Eloff, J.H.P. (1995) Classification of objects for improved access control Computers & Security Vol. 14, No. 3, North-Holland
1995 Eloff, J.H.P. (1995) Information Security: State-of-the-art overview IT Review, (Official journal of the Computer Society of South Africa)
1994 Badenhorst, K.P., Eloff, J.H.P. (1994) TOPM: A Formal approach to the optimisation of Information Technology Risk Management Computers & Security Vol. 13, No. 5, North-Holland
1994 Bauknecht, K., Eloff, J.H.P., Teufel, S (1994) Security management in Computer Supported Co-operative Work Technical report, Institut fur Informatik, University of Zurich, Zurich, Switzerland
1994 Eloff, J.H.P., Holbein, R., Teufel S (1994) Security Classification for Documents Technical report, Institut fur Informatik, University of Zurich, Zurich, Switzerland
1993 Badenhorst, K.P., Eloff, J.H.P., Labuschagne, L. (1993) A Comparative Framework for Risk Analysis Methods Computers & Security Vol. 12, No. 9
1993 Eloff, J.H.P., Klut, J.P. (1993) MethoDex: A Framework for an expert system development methodology Lecture notes in Artificial Intelligence, Springer-Verlag
1990 Badenhorst, K.P., Eloff, J.H.P. (1990) Computer security methodology: risk analysis and project definition Computers & Security Vol. 9, No. 4, pp 339-346 North-Holland
1990 Eloff, J.H.P. (1990) Computer Security: Research and Practice (A) South African Journal for Science, Vol. 86, March 1990
1990 Eloff, J.H.P. (1990) Managing Computer Security: Methodology and Policy Information Age, Vol. 12 No 4, Elsevier, UK
1990 Eloff, J.H.P., Von Solms, R., Von Solms, S.H. (1990) Computer Security Management: a framework for effective management involvement, Information Age
1989 Badenhorst, K.P., Eloff, J.H.P. (1989) Framework for a methodology for the life cycle of computer security in an organisation Computers & Security Vol. 8, North-Holland
1989 Eloff, J.H.P. (1989) A methodology for the implementation of computer security in an organisation Computers & Security, North-Holland
1989 Eloff, J.H.P., Mostert, D.N.J., Von Solms, S.H. (1989) A methodology for measuring user satisfaction Information Processing & Management, Vol. 25, No. 5, Pergamon Press
1988 Eloff, J.H.P. (1988) Computer Security Policy: Important issues Computers & Security Vol. 7, No 6, pp 559 - 562 North-Holland
1985 Eloff, J.H.P. (1985) The development of a specification language for a computer security system, Computers & Security (4)
1983 Eloff, J.H.P. (1983) Selection Process for Security Packages Computers & Security Vol. 2, No. 3
  Return to Top