Institutional Repository

Browsing South African Computer Journal (SACJ) by Subject "Information security"

Browsing South African Computer Journal (SACJ) by Subject "Information security"

Sort by: Order: Results:

  • Smuts, W (South African Computer Society (SAICSIT), 1999)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Hoffman, LJ (South African Computer Society (SAICSIT), 1996)
    Cryptology policy deals not only with various technological encryption methods but also with thorny political and adminis­trative problems. It is a challenge to address these in a timely and open manner. The problems arise ...
  • Muftic, S (South African Computer Society (SAICSIT), 1996)
    The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security ...
  • Parker, DB (South African Computer Society (SAICSIT), 1996)
    It is reasoned that to preserve the three traditional elements of information security, confidentiality, integrity and availabil­ity, it is not sufficient to fully protect information. Three new elements are introduced: ...
  • Smuts, WB (South African Computer Society (SAICSIT), 1994)
    This article provides a survey of techniques which can be used to add authenticity to electronic documents and messages.

Search UnisaIR


Browse

My Account