Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Reinhardt A. Botha
2010 – today
- 2013
[c16]Bertram Haskins, Reinhardt A. Botha: Identifying Tag Word Counterparts for Dr. Math. AAAI Spring Symposium: Analyzing Microtext 2013
[c15]Laurie L. Butgereit, Reinhardt A. Botha: An architecture for synchronous micro-volunteering in Africa using social media. PerCom Workshops 2013: 175-180
[c14]Laurie L. Butgereit, Reinhardt A. Botha: A comparison of different calculations for N-gram similarities in a spelling corrector for mobile instant messaging language. SAICSIT Conf. 2013: 1-7- 2012
[c13]Phumezo Ntlatywa, Reinhardt A. Botha, Bertram Haskins: Claimed vs observed information disclosure on social networking sites. ISSA 2012: 1-6
[c12]Phumezo Ntlatywa, Reinhardt A. Botha, Bertram Haskins: Factors that Influence the Choice of Privacy Settings on Facebook: Freshmen's View at a South African University. SocialCom/PASSAT 2012: 843-850- 2011
[c11]Ryan Gavin Goss, Reinhardt A. Botha: Traffic Management in Next Generation Service Provider Networks - Are We There Yet? ISSA 2011
[c10]Laurie L. Butgereit, Reinhardt A. Botha: Using N-grams to identify mathematical topics in MXit lingo. SAICSIT Conf. 2011: 40-48- 2010
[c9]Laurie L. Butgereit, Reinhardt A. Botha: C3TO: A Scalable Architecture for Mobile Tutoring over Cell Phones. WCITD/NF 2010: 15-25
[c8]Godwin Thomas, Reinhardt A. Botha: Virtual Communities as a Mechanism for Sustainable Coordination within the South African Public Sector. EGES/GISP 2010: 62-75
[c7]Laurie L. Butgereit, Reinhardt A. Botha: A busyness model for assigning tutors to pupils in a mobile, online tutoring system: a look at C3TO. SAICSIT Conf. 2010: 350-355
2000 – 2009
- 2009
[j11]Reinhardt A. Botha, Steven Furnell, Nathan L. Clarke: From desktop to mobile: Examining the security experience. Computers & Security 28(3-4): 130-137 (2009)- 2008
[j10]Jacobus A. Ophoff, Reinhardt A. Botha: Mobile communications: user perception and practice. South African Computer Journal 40: 63-73 (2008)
[e2]Reinhardt A. Botha, Charmain Cilliers (Eds.): Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT Conf. 2008, Wilderness, South Africa, October 6-8, 2008. ACM International Conference Proceeding Series 338, ACM 2008, ISBN 978-1-60558-286-3- 2007
[j9]Godwin Thomas, Reinhardt A. Botha: Secure Mobile Device Use in Healthcare Guidance from HIPAA and ISO17799. IS Management 24(4): 333-342 (2007)
[e1]Lynette Barnard, Reinhardt A. Botha (Eds.): Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT Conf. 2007, Port Elizabeth, South Africa, October 2-3, 2007. ACM International Conference Proceeding Series 226, ACM 2007, ISBN 978-1-59593-775-9- 2006
[j8]Reinhardt A. Botha, Tshepo G. Gaadingwe: Reflecting on 20 SEC conferences. Computers & Security 25(4): 247-256 (2006)
[c6]Jacobus A. Ophoff, Reinhardt A. Botha: Privacy-enhancing Call Management in an IP-based Infrastructure. ICWMC 2006: 42
[c5]Jacobus A. Ophoff, Stephen Perelson, Reinhardt A. Botha: A Model for Secure Value-Added Service Subscriptions in Cellular Networks. ISSA 2006: 1-9- 2005
[c4]Jacobus A. Ophoff, Reinhardt A. Botha: Revisiting Reachability Management as a Multilateral Security Mechanism. ISSA 2005: 1-12- 2002
[j7]Reinhardt A. Botha, Jan H. P. Eloff: An access control architecture for XML documents in workflow environments. South African Computer Journal 28: 3-10 (2002)
[c3]- 2001
[j6]Reinhardt A. Botha, Jan H. P. Eloff: Access Control in Document-centric Workflow Systems An Agent-based Approach. Computers & Security 20(6): 525-532 (2001)
[j5]Reinhardt A. Botha, Jan H. P. Eloff: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3): 666-682 (2001)
[j4]Reinhardt A. Botha, Jan H. P. Eloff: A framework for access control in workflow systems. Inf. Manag. Comput. Security 9(3): 126-133 (2001)
[j3]Stephen Perelson, Reinhardt A. Botha, Jan H. P. Eloff: Separation of Duty administration. South African Computer Journal 27: 64-69 (2001)
[c2]Reinhardt A. Botha, Jan H. P. Eloff: Designing Role Hierarchies for Access Control in Workflow Systems. COMPSAC 2001: 117-122- 2000
[j2]C. Papenfus, Reinhardt A. Botha: An XML based approach to enforcing history-based separation of duty policies in heterogeneous workflow environments. South African Computer Journal 26: 60-68 (2000)
[j1]Stephen Perelson, Reinhardt A. Botha: Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments. South African Computer Journal 26: 212-216 (2000)
[c1]Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff: A Context-Sensitive Access Control Model and Prototype Implementation. SEC 2000: 341-350
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:07 CEST by the dblp team



