Institutional Repository

Browsing South African Computer Journal 1996(17) by Title

Browsing South African Computer Journal 1996(17) by Title

Sort by: Order: Results:

  • Pangalos, G; Khair, M (South African Computer Society (SAICSIT), 1996)
    A database design methodology is presented in this paper which aims to improve the security of medical database systems. The proposed methodology is based on both the discretionary and the mandatory database security ...
  • Hoffman, LJ (South African Computer Society (SAICSIT), 1996)
    Cryptology policy deals not only with various technological encryption methods but also with thorny political and adminis­trative problems. It is a challenge to address these in a timely and open manner. The problems arise ...
  • Muftic, S (South African Computer Society (SAICSIT), 1996)
    The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security ...
  • Von Solms, SH (South African Computer Society (SAICSIT), 1996)
    This paper discusses a number of security protocols for the Internet and World Wide Web. The first two, SSL and SHTTP, provide general authentication, confidentiality and integrity facilities, while SEPP is a payment ...
  • Parker, DB (South African Computer Society (SAICSIT), 1996)
    It is reasoned that to preserve the three traditional elements of information security, confidentiality, integrity and availabil­ity, it is not sufficient to fully protect information. Three new elements are introduced: ...
  • De Ru, WG; Eloff, JHP (South African Computer Society (SAICSIT), 1996)
    This paper presents a methodology for the reinforcement of password authentication with the use of typing biometrical mechanisms. Typing biometrics refers to the analysis of keystroke patterns, which is unique for each ...

Search UnisaIR


Browse

My Account