


default search action
South African Computer Journal, Volume 31
Volume 31, 2003
- Derrick G. Kourie:

Editorial. 1-1 - Jason Crampton, Hemanth Khambhammettu:

Access control in a distributed object environment using XML and roles. 2-8 - Nanjangud C. Narendra:

AdaptAgent : integrated architecture for adaptive workflow and agents. 9-17 - Elme Smith, Mariki M. Eloff, Lucas M. Venter, Andries Barnard, Laurette Pretorius:

Agents, security and ethics: a framework for analysis. 18-24 - S. A. Lukell, A. C. M. Hutchison:

Attack analysis of cryptographic protocols using strand spaces. 25-32 - L. Coetzlee, Elizabeth C. Botha:

Empirical results of an image-based automated vehicle identification system. 33-39 - H. S. Venter, Jan H. P. Eloff:

Evaluating vulnerability scanners using harmonised vulnerability categories. 40-45 - Thomas Schlienger, Stephanie Teufel:

Information security culture - from analysis to change. 46-52 - Martin S. Olivier:

A layered architecture for privacy - enhancing technologies. 53-61 - H. Pham, Z. Jiang:

Spam control via a distributed scheme of merit accumulation. 62-69

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














