Obserwuj
Reinhardt A. Botha
Reinhardt A. Botha
Professor of Information Technology, Nelson Mandela University, Port Elizabeth
Zweryfikowany adres z nmmu.ac.za
Tytuł
Cytowane przez
Cytowane przez
Rok
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM systems Journal 40 (3), 666-682, 2001
3192001
From desktop to mobile: Examining the security experience
RA Botha, SM Furnell, NL Clarke
Computers & Security 28 (3-4), 130-137, 2009
1512009
A context-sensitive access control model and prototype implementation
DG Cholewka, RA Botha, JHP Eloff
Information Security for Global Information Infrastructures: IFIP TC11 …, 2000
562000
Perceptions of user authentication on mobile devices
S Karatzouni, SM Furnell, NL Clarke, RA Botha
Proceedings of the ISOneWorld Conference, 11-13, 2007
502007
A framework for access control in workflow systems
RA Botha, JHP Eloff
Information management & computer security 9 (3), 126-133, 2001
472001
Access control in document-centric workflow systems—an agent-based approach
RA Botha, JHP Eloff
Computers & Security 20 (6), 525-532, 2001
462001
Enforcement of the Protection of Personal Information (POPI) Act : perspective of data management professionals
AT Kandeh, RA Botha, LA Futcher
South African Journal of Information Management 20 (1), 1-9, 2018
442018
Designing role hierarchies for access control in workflow systems
RA Botha, JHP Eloff
25th Annual International Computer Software and Applications Conference …, 2001
432001
CoSAWoE-a model for context-sensitive access control in workflow environments.
RA Botha
Rand Afrikaans University, 2001
382001
Safeguarding information as an asset: Do we need a redefinition in the knowledge economy and beyond?
AK Adesemowo, R Von Solms, RA Botha
South African Journal of Information Management 18 (1), 1-12, 2016
302016
Reflecting on 20 SEC conferences
RA Botha, TG Gaadingwe
Computers & Security 25 (4), 247-256, 2006
282006
An investigation into access control for mobile devices
S Perelson, R Botha
ISSA 2004, 2004
282004
Secure mobile device use in healthcare guidance from HIPAA and ISO17799
G Thomas, RA Botha
Information Systems Management 24 (4), 333-342, 2007
232007
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
S Perelson, RA Botha
South African Computer Journal 2000 (26), 212-216, 2000
202000
Preventing and mitigating ransomware: A systematic literature review
Z Manjezi, RA Botha
Information Security: 17th International Conference, ISSA 2018, Pretoria …, 2019
19*2019
Seven characteristics of a successful virtual volunteering platform
L Butgereit
2011 IST-Africa Conference Proceedings, 1-8, 2011
182011
Social networks–access all areas?
S Furnell, RA Botha
Computer Fraud & Security 2011 (5), 14-19, 2011
172011
A security interpretation of the workflow reference model
RA Botha, JHP Eloff
Information Security-from Small systems to management of secure …, 1998
171998
Process model for differentiated instruction using learning analytics
RG Leppan, JF Van Niekerk, RA Botha
South African Computer Journal 30 (2), 17-43, 2018
152018
Consumer-centric factors for the implementation of smart meters in South Africa
T Muchenje, RA Botha
South African Computer Journal 33 (2), 17-54, 2021
142021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20