Prati
Reinhardt A. Botha
Reinhardt A. Botha
Professor of Information Technology, Nelson Mandela University, Port Elizabeth
Potvrđena adresa e-pošte na nmmu.ac.za
Naslov
Citirano
Citirano
Godina
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM systems Journal 40 (3), 666-682, 2001
3092001
From desktop to mobile: Examining the security experience
RA Botha, SM Furnell, NL Clarke
Computers & Security 28 (3-4), 130-137, 2009
1472009
A context-sensitive access control model and prototype implementation
DG Cholewka, RA Botha, JHP Eloff
Information Security for Global Information Infrastructures: IFIP TC11 …, 2000
562000
Access control in document-centric workflow systems—an agent-based approach
RA Botha, JHP Eloff
Computers & Security 20 (6), 525-532, 2001
462001
A framework for access control in workflow systems
RA Botha, JHP Eloff
Information management & computer security 9 (3), 126-133, 2001
462001
Perceptions of user authentication on mobile devices
S Karatzouni, SM Furnell, NL Clarke, RA Botha
Proceedings of the ISOneWorld Conference, 11-13, 2007
452007
Designing role hierarchies for access control in workflow systems
RA Botha, JHP Eloff
25th Annual International Computer Software and Applications Conference …, 2001
422001
CoSAWoE-a model for context-sensitive access control in workflow environments.
RA Botha
Rand Afrikaans University, 2001
362001
Enforcement of the Protection of Personal Information (POPI) Act : perspective of data management professionals
AT Kandeh, RA Botha, LA Futcher
South African Journal of Information Management 20 (1), 1-9, 2018
322018
Safeguarding information as an asset: Do we need a redefinition in the knowledge economy and beyond?
AK Adesemowo, R Von Solms, RA Botha
South African Journal of Information Management 18 (1), 1-12, 2016
302016
An investigation into access control for mobile devices
S Perelson, R Botha
ISSA 2004, 2004
282004
Reflecting on 20 SEC conferences
RA Botha, TG Gaadingwe
Computers & Security 25 (4), 247-256, 2006
272006
Secure mobile device use in healthcare guidance from HIPAA and ISO17799
G Thomas, RA Botha
Information Systems Management 24 (4), 333-342, 2007
232007
Seven characteristics of a successful virtual volunteering platform
L Butgereit
2011 IST-Africa Conference Proceedings, 1-8, 2011
192011
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
S Perelson, RA Botha
South African Computer Journal 2000 (26), 212-216, 2000
192000
Social networks–access all areas?
S Furnell, RA Botha
Computer Fraud & Security 2011 (5), 14-19, 2011
172011
A security interpretation of the workflow reference model
RA Botha, JHP Eloff
Information Security-from Small systems to management of secure …, 1998
151998
Preventing and Mitigating Ransomware: A Systematic Literature Review
Z Manjezi, RA Botha
Information Security: 17th International Conference, ISSA 2018, Pretoria …, 2019
14*2019
Understanding the impact of default privacy settings on self-disclosure in social networking services: Building a conceptual model and measurement instrument
M Tschersich, RA Botha
122013
ITAOFIR: IT asset ontology for information risk in knowledge economy and beyond
AK Adesemowo, R von Solms, RA Botha
Global Security, Safety and Sustainability-The Security Challenges of the …, 2016
112016
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20