What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sebastiaan H. von Solms
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2010
journals/compsec
Cyber security for home users: A new way of protection through awareness enforcement.
Elmarie Kritzinger
Sebastiaan H. von Solms
2006
journals/compsec
Information Security Governance: A model based on the Direct-Control Cycle.
Rossouw von Solms
Sebastiaan H. von Solms
2006
journals/compsec
Information security governance: Due care.
Rossouw von Solms
Sebastiaan H. von Solms
2006
journals/compsec
Information Security - The Fourth Wave.
Sebastiaan H. von Solms
2005
conf/sec
ERPSEC - A Reference Framework to Enhance Security in ERP Systems.
Sebastiaan H. von Solms
M. P. Hertenberger
2004
journals/compsec
From secure wired networks to secure wireless networks - what are the extra risks?
Sebastiaan H. von Solms
Emil Marais
2004
journals/compsec
The 10 deadly sins of information security management.
Sebastiaan H. von Solms
Rossouw von Solms
2004
journals/compsec
From policies to culture.
Rossouw von Solms
Sebastiaan H. von Solms
2004
conf/sec
A Case For Information Ownership in ERP Systems.
Sebastiaan H. von Solms
M. P. Hertenberger
2000
journals/compsec
Information Security Management: A Hierarchical Framework for Various Approaches.
Mariki M. Eloff
Sebastiaan H. von Solms
2000
journals/compsec
Information Security Management: An Approach to Combine Process Certification And Product Evaluation.
Mariki M. Eloff
Sebastiaan H. von Solms
2000
conf/sec
Information Security: Process Evaluation and Product Evaluation.
Mariki M. Eloff
Sebastiaan H. von Solms
2000
conf/sec
"DNA-proofing" for Computer Systems - A New Approach to Computer Security?
C. P. Louwrens
Sebastiaan H. von Solms
2000
conf/sec
Information Security Management Through Measurement.
Elmarie von Solms
Sebastiaan H. von Solms
1999
journals/compsec
Managing multi level security in a military intranet environment.
Sebastiaan H. von Solms
J. H. S. Geldenhuys
1998
journals/compsec
Collecting security baggage on the internet.
Sebastiaan H. von Solms
J. H. S. Geldenhuys
1998
journals/compsec
Electronic commerce with secure intelligent trade agents.
Sebastiaan H. von Solms
1997
conf/sec
Selection of secure single sign-on solutions for heterogeneous computing environments.
C. P. Louwrens
Sebastiaan H. von Solms
1997
conf/sec
A comparison of schemes for certification authorities/trusted third parties.
A. van Rensburg
Sebastiaan H. von Solms
1997
conf/sec
Roaming security agents enabling intelligent access control and network protection.
P. W. J. van Zyl
Sebastiaan H. von Solms
1997
conf/icics
Electronic commerce with secure intelligent trade agent.
Jacobus E. van der Merwe
Sebastiaan H. von Solms
1996
conf/sec
MoFAC: a model for fine-grained access control.
Johan S. von Solms
Martin S. Olivier
Sebastiaan H. von Solms
1996
conf/sec
Information security on the electronic superhighway.
Sebastiaan H. von Solms
1994
journals/compsec
The management of computer security profiles using a role-oriented approach.
Sebastiaan H. von Solms
Isak van der Merwe
1994
journals/compsec
A methodology to include computer security, safety and resilience requirements as part of the user requirement.
D. N. J. Mostert
Sebastiaan H. von Solms
1993
conf/sec
A Model for Organising Information Security Documentation.
L. M. du Toit
Sebastiaan H. von Solms
1993
conf/sec
A Process Approach to Information Security Management.
Rossouw von Solms
Sebastiaan H. von Solms
John M. Carroll
1993
conf/sec
Superseding Manual Generation of Access Control Specification - From Policies to Profiles.
Dalenca Pottas
Sebastiaan H. von Solms
1992
journals/compsec
Building a secure database using self-protecting objects.
Martin S. Olivier
Sebastiaan H. von Solms
1992
journals/compsec
On blind signatures and perfect crimes.
Sebastiaan H. von Solms
David Naccache
1992
conf/sec
MAPS - Model for Automated Profile Specification.
Dalenca Pottas
Sebastiaan H. von Solms
1992
conf/sec
DISCO - A Discretionary Security Model for Object-oriented Databases.
Martin S. Olivier
Sebastiaan H. von Solms
1991
journals/compsec
A computerized management reporting aid for a mainframe security system.
Dalenca Pottas
Sebastiaan H. von Solms
1989
journals/compsec
A path context model for addressing security in potentially non-secure environments.
W. H. Boshoff
Sebastiaan H. von Solms
Coauthors
A. van Rensburg
(1)
C. P. Louwrens
(2)
D. N. J. Mostert
(1)
Dalenca Pottas
(3)
David Naccache
(1)
Elmarie Kritzinger
(1)
Elmarie von Solms
(1)
Emil Marais
(1)
Isak van der Merwe
(1)
J. H. S. Geldenhuys
(2)
Jacobus E. van der Merwe
(1)
Johan S. von Solms
(1)
John M. Carroll
(1)
L. M. du Toit
(1)
M. P. Hertenberger
(2)
Mariki M. Eloff
(3)
Martin S. Olivier
(3)
P. W. J. van Zyl
(1)
Rossouw von Solms
(5)
Sebastiaan H. von Solms
(34)
W. H. Boshoff
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to