default search action
Sebastiaan H. von Solms
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j45]Laban Bagui, Shallen Lusinga, Nthabiseng Pule, Teofelus Tonateni Tuyeni, Chimwemwe Queen Mtegha, Enrico Calandro, Wallace Chigona, Basie von Solms:
The impact of COVID-19 on cybersecurity awareness-raising and mindset in the southern African development community (SADC). Electron. J. Inf. Syst. Dev. Ctries. 89(4) (2023) - 2022
- [j44]Ruth Shillair, Patricia Esteve-González, William H. Dutton, Sadie Creese, Eva Nagyfejeo, Basie von Solms:
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Comput. Secur. 119: 102756 (2022) - 2019
- [j43]Petrus Duvenage, Thenjiwe Sithole, Basie von Solms:
Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework. Int. J. Cyber Warf. Terror. 9(4): 44-62 (2019) - 2018
- [j42]Basie von Solms, Rossouw von Solms:
Cybersecurity and information security - what goes where? Inf. Comput. Secur. 26(1): 2-9 (2018) - 2015
- [j41]Victor Jaquire, Basie von Solms:
A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare. Int. J. Cyber Warf. Terror. 5(1): 1-18 (2015) - 2010
- [j40]Elmarie Kritzinger, Sebastiaan H. von Solms:
Cyber security for home users: A new way of protection through awareness enforcement. Comput. Secur. 29(8): 840-847 (2010) - 2009
- [j39]Bobby L. Tait, Sebastiaan H. von Solms:
BioVault: biometrically based encryption. Int. J. Electron. Secur. Digit. Forensics 2(3): 269-279 (2009) - 2006
- [j38]Sebastiaan H. von Solms:
Information Security - The Fourth Wave. Comput. Secur. 25(3): 165-168 (2006) - [j37]Rossouw von Solms, Sebastiaan H. von Solms:
Information Security Governance: A model based on the Direct-Control Cycle. Comput. Secur. 25(6): 408-412 (2006) - [j36]Rossouw von Solms, Sebastiaan H. von Solms:
Information security governance: Due care. Comput. Secur. 25(7): 494-497 (2006) - 2005
- [j35]Basie von Solms:
Information Security governance: COBIT or ISO 17799 or both? Comput. Secur. 24(2): 99-104 (2005) - [j34]Basie von Solms, Rossouw von Solms:
From information security to ... business security? Comput. Secur. 24(4): 271-273 (2005) - [j33]Basie von Solms:
Information Security Governance - Compliance management vs operational management. Comput. Secur. 24(6): 443-447 (2005) - 2004
- [j32]Rossouw von Solms, Sebastiaan H. von Solms:
From policies to culture. Comput. Secur. 23(4): 275-279 (2004) - [j31]Sebastiaan H. von Solms, Rossouw von Solms:
The 10 deadly sins of information security management. Comput. Secur. 23(5): 371-376 (2004) - [j30]Sebastiaan H. von Solms, Emil Marais:
From secure wired networks to secure wireless networks - what are the extra risks? Comput. Secur. 23(8): 633-637 (2004) - 2001
- [j29]Basie von Solms:
Corporate Governance and Information Security. Comput. Secur. 20(3): 215-218 (2001) - [j28]Basie von Solms, Rossouw von Solms:
Incremental Information Security Certification. Comput. Secur. 20(4): 308-310 (2001) - [j27]Basie von Solms:
Information Security - A Multidimensional Discipline. Comput. Secur. 20(6): 504-508 (2001) - 2000
- [j26]Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security Management: A Hierarchical Framework for Various Approaches. Comput. Secur. 19(3): 243-256 (2000) - [j25]Basie von Solms:
Information Security - The Third Wave? Comput. Secur. 19(7): 615-620 (2000) - [j24]Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security Management: An Approach to Combine Process Certification And Product Evaluation. Comput. Secur. 19(8): 698-709 (2000) - 1999
- [j23]Sebastiaan H. von Solms, J. H. S. Geldenhuys:
Managing multi level security in a military intranet environment. Comput. Secur. 18(3): 257-270 (1999) - 1998
- [j22]Sebastiaan H. von Solms, J. H. S. Geldenhuys:
Collecting security baggage on the internet. Comput. Secur. 17(4): 337-345 (1998) - [j21]Sebastiaan H. von Solms:
Electronic commerce with secure intelligent trade agents. Comput. Secur. 17(5): 435-446 (1998) - 1995
- [j20]D. N. J. Mostert, Sebastiaan H. von Solms:
A technique to include computer security, safety, and resilience requirements as part of the requirements specification. J. Syst. Softw. 31(1): 45-53 (1995) - 1994
- [j19]D. N. J. Mostert, Sebastiaan H. von Solms:
A methodology to include computer security, safety and resilience requirements as part of the user requirement. Comput. Secur. 13(4): 349-364 (1994) - [j18]Sebastiaan H. von Solms, Isak van der Merwe:
The management of computer security profiles using a role-oriented approach. Comput. Secur. 13(8): 673-680 (1994) - [j17]Rossouw von Solms, Helen van de Haar, Sebastiaan H. von Solms, William J. Caelli:
A framework for information security evaluation. Inf. Manag. 26(3): 143-153 (1994) - [j16]Martin S. Olivier, Sebastiaan H. von Solms:
A Taxonomy for Secure Object-Oriented Databases. ACM Trans. Database Syst. 19(1): 3-46 (1994) - 1993
- [j15]Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli:
A Model for Information Security Management. Inf. Manag. Comput. Secur. 1(3): 12-17 (1993) - 1992
- [j14]Martin S. Olivier, Sebastiaan H. von Solms:
Building a secure database using self-protecting objects. Comput. Secur. 11(3): 259-271 (1992) - [j13]Sebastiaan H. von Solms, David Naccache:
On blind signatures and perfect crimes. Comput. Secur. 11(6): 581-583 (1992) - [j12]P. G. Mulder, Sebastiaan H. von Solms:
The implementation of a protocol using automata. Inf. Sci. 59(1-2): 53-89 (1992) - 1991
- [j11]Dalenca Pottas, Sebastiaan H. von Solms:
A computerized management reporting aid for a mainframe security system. Comput. Secur. 10(7): 653-660 (1991) - [j10]E. M. Ehlers, Sebastiaan H. von Solms:
Random context structure grammars and automata--a formal approach. Inf. Sci. 53(1-2): 159-183 (1991) - 1989
- [j9]W. H. Boshoff, Sebastiaan H. von Solms:
A path context model for addressing security in potentially non-secure environments. Comput. Secur. 8(5): 417-425 (1989) - [j8]E. M. Ehlers, Sebastiaan H. von Solms:
Using Random Context Structure Grammars to Represent Chemical Structures. Inf. Process. Lett. 30(3): 159-166 (1989) - [j7]D. N. J. Mostert, Jan H. P. Eloff, Sebastiaan H. von Solms:
A methodology for measuring user satisfaction. Inf. Process. Manag. 25(5): 545-556 (1989) - 1988
- [j6]M. H. Rennhackkamp, Sebastiaan H. von Solms:
On Using an Abstract Model of Distributed Database Concurrency Control Methods. Comput. J. 31(6): 570-572 (1988) - 1987
- [j5]E. M. Ehlers, Sebastiaan H. von Solms:
A hierarchy of random-context grammars and automata. Inf. Sci. 42(1): 1-29 (1987) - 1978
- [j4]Grzegorz Rozenberg, Sebastiaan H. von Solms:
Priorities on context conditions in rewriting systems. Inf. Sci. 14(1): 15-50 (1978) - [j3]Grzegorz Rozenberg, Sebastiaan H. von Solms:
Rewriting systems with a clocking mechanism. Inf. Sci. 14(3): 221-280 (1978) - 1975
- [j2]Sebastiaan H. von Solms:
The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area. Inf. Control. 27(3): 262-271 (1975) - [j1]Sebastiaan H. von Solms:
On T0L Languages over Terminals. Inf. Process. Lett. 3(3): 69-70 (1975)
Conference and Workshop Papers
- 2023
- [c58]Sebastiaan H. von Solms, Jaco du Toit, Elmarie Kritzinger:
Another Look at Cybersecurity Awareness Programs. HAISA 2023: 13-23 - 2022
- [c57]Petrus Duvenage, Victor Jaquire, Sebastiaan H. von Solms:
South Africa's Taxi Industry as a Cybersecurity-Awareness Game Changer: Why and How? World Conference on Information Security Education 2022: 92-106 - 2018
- [c56]Frans F. Blauw, Sebastiaan H. von Solms:
Towards Collecting and Linking Personal Information for Complete Personal Online Identity Modelling. HCI (1) 2018: 507-522 - 2015
- [c55]Rossouw de Bruin, Sebastiaan H. von Solms:
Modelling Cyber Security Governance Maturity. ISTAS 2015: 1-8 - [c54]Candice Louw, Sebastiaan H. von Solms:
Towards a Smartphone User Competency Evolution Model. SAICSIT 2015: 26:1-26:8 - 2013
- [c53]Manuel Corregedor, Sebastiaan H. von Solms:
Windows 8 32 bit - Improved security? AFRICON 2013: 1-5 - [c52]Candice Louw, Sebastiaan H. von Solms:
Personally identifiable information leakage through online social networks. SAICSIT 2013: 68-71 - [c51]Dustin van der Haar, Basie von Solms:
Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks. SECRYPT 2013: 494-499 - 2012
- [c50]Ian Ellefsen, Sebastiaan H. von Solms:
Implementing Critical Information Infrastructure Protection Structures in Developing Countries. Critical Infrastructure Protection 2012: 17-29 - [c49]Manuel Corregedor, Sebastiaan H. von Solms:
ATE: Anti-malware technique evaluator. ISSA 2012: 1-8 - 2011
- [c48]Basie von Solms, Elmarie Kritzinger:
Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed? AFRICOMM 2011: 116-124 - [c47]Manuel Corregedor, Sebastiaan H. von Solms:
Implementing Rootkits to Address Operating System Vulnerabilities. ISSA 2011 - [c46]Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous:
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. SEC 2011: 317-325 - 2010
- [c45]Talania Grobler, C. P. Louwrens, Sebastiaan H. von Solms:
A Multi-component View of Digital Forensics. ARES 2010: 647-652 - [c44]Talania Grobler, C. P. Louwrens, Sebastiaan H. von Solms:
A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations. ARES 2010: 677-682 - [c43]Annette Tolnai, Sebastiaan H. von Solms:
Managing Some Security Risks Related to the Deployment of Multifarious Authentication and Authorization in a Virtualized Environment. BWCCA 2010: 112-116 - [c42]Annette Tolnai, Sebastiaan H. von Solms:
Securing the Cloud's Core Virtual Infrastructure. BWCCA 2010: 447-452 - [c41]Ian Ellefsen, Sebastiaan H. von Solms:
C-SAW: Critical Information Infrastructure Protection through Simplification. HCC 2010: 315-325 - [c40]Annette Tolnai, Sebastiaan H. von Solms:
The Cloud's Core Virtual Infrastructure Security. ICGS3 2010: 19-27 - [c39]Annette Tolnai, Sebastiaan H. von Solms:
A Virtualized Environment Security (VES) model for a secure virtualized environment. ICITST 2010: 1-6 - [c38]Ian Ellefsen, Sebastiaan H. von Solms:
Critical Information Infrastructure Protection in the Developing World. Critical Infrastructure Protection 2010: 29-40 - [c37]Basie von Solms:
Securing the Internet: Fact or Fiction? iNetSec 2010: 1-8 - [c36]Louis Jordaan, Basie von Solms:
A Biometrics-Based Solution to Combat SIM Swap Fraud. iNetSec 2010: 70-87 - [c35]S. H. (Basie) von Solms:
The 5 Waves of Information Security - From Kristian Beckman to the Present. SEC 2010: 1-8 - [c34]Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous:
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. SEC 2010: 302-310 - 2009
- [c33]Basie von Solms:
Is the Information Security King Naked?. ACISP 2009: 1-7 - [c32]Bobby L. Tait, Sebastiaan H. von Solms:
Biovault: Biometrically Based Encryption. I3E 2009: 39-50 - [c31]Annette Tolnai, Sebastiaan H. von Solms:
Solving security issues using Information Security Awareness Portal. ICITST 2009: 1-5 - [c30]Marthie Grobler, Basie von Solms:
A Best Practice Approach to Live Forensic Acquisition. ISSA 2009: 3-13 - [c29]Marthie Lessing, Basie von Solms:
Modelling Live Forensic Acquisition. WDFIA 2009: 72-80 - 2007
- [c28]Christopher Andrade, Sebastiaan H. von Solms:
Investigating and Comparing Multimodal Biometric Techniques. IDMAN 2007: 79-90 - [c27]Colby G. Crossingham, Sebastiaan H. von Solms:
BASE: a Proposed Secure Biometric Authentication System. IDMAN 2007: 91-102 - [c26]Christian J. Eibl, Basie von Solms, Sigrid E. Schubert:
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. SEC 2007: 181-192 - 2006
- [c25]Sebastiaan H. von Solms, C. P. Louwrens, Colette Reekie, Talania Grobler:
A Control Framework for Digital Forensics. IFIP Int. Conf. Digital Forensics 2006: 343-355 - [c24]Colette Reekie, Basie von Solms:
A Corporate Capital Protection and Assurance Model. OTM Workshops (1) 2006: 546-553 - 2005
- [c23]Basie von Solms, Bobby L. Tait:
Biovault: Solving the Problem of Replay in Biometrics. I3E 2005: 465-479 - [c22]Sebastiaan H. von Solms, M. P. Hertenberger:
ERPSEC - A Reference Framework to Enhance Security in ERP Systems. SEC 2005: 79-94 - 2004
- [c21]Elmarie Kritzinger, Sebastiaan H. von Solms:
Five Non-Technical Pillars of Network Information Security Management. Communications and Multimedia Security 2004: 277-287 - [c20]Sebastiaan H. von Solms, M. P. Hertenberger:
A Case For Information Ownership in ERP Systems. SEC 2004: 135-150 - 2003
- [c19]Elmari Pretorius, Basie von Solms:
Information Security Governance using ISO 17799 and COBIT. IICIS 2003: 107-113 - 2001
- [c18]Sebastiaan H. von Solms, M. V. Kisimov:
Information Security: Mutual Authentication in E-Commerce. Network Security 2001: 15-31 - 2000
- [c17]Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security: Process Evaluation and Product Evaluation. SEC 2000: 11-18 - [c16]Elmarie von Solms, Sebastiaan H. von Solms:
Information Security Management Through Measurement. SEC 2000: 59-68 - [c15]C. P. Louwrens, Sebastiaan H. von Solms:
"DNA-proofing" for Computer Systems - A New Approach to Computer Security? SEC 2000: 121-129 - 1997
- [c14]Jacobus E. van der Merwe, Sebastiaan H. von Solms:
Electronic commerce with secure intelligent trade agent. ICICS 1997: 452-462 - [c13]C. P. Louwrens, Sebastiaan H. von Solms:
Selection of secure single sign-on solutions for heterogeneous computing environments. SEC 1997: 9-24 - [c12]A. van Rensburg, Sebastiaan H. von Solms:
A comparison of schemes for certification authorities/trusted third parties. SEC 1997: 222-240 - [c11]P. W. J. van Zyl, Sebastiaan H. von Solms:
Roaming security agents enabling intelligent access control and network protection. SEC 1997: 452-468 - 1996
- [c10]Sebastiaan H. von Solms:
Information security on the electronic superhighway. SEC 1996: 153-166 - [c9]Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms:
MoFAC: a model for fine-grained access control. SEC 1996: 295-305 - 1993
- [c8]L. M. du Toit, Sebastiaan H. von Solms:
A Model for Organising Information Security Documentation. SEC 1993: 227-242 - [c7]Dalenca Pottas, Sebastiaan H. von Solms:
Superseding Manual Generation of Access Control Specification - From Policies to Profiles. SEC 1993: 327-342 - [c6]Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll:
A Process Approach to Information Security Management. SEC 1993: 385-399 - 1992
- [c5]Dalenca Pottas, Sebastiaan H. von Solms:
MAPS - Model for Automated Profile Specification. SEC 1992: 113-126 - [c4]Martin S. Olivier, Sebastiaan H. von Solms:
DISCO - A Discretionary Security Model for Object-oriented Databases. SEC 1992: 345-357 - 1980
- [c3]Sebastiaan H. von Solms:
Random Context Array Grammmars. IFIP Congress 1980: 59-64 - 1976
- [c2]Grzegorz Rozenberg, Sebastiaan H. von Solms:
Some Aspects of Random Context Grammars. GI Jahrestagung 1976: 63-75 - 1973
- [c1]Sebastiaan H. von Solms:
The characterization of certain classes of languages in the context sensitive area by automata. Automatentheorie und Formale Sprachen 1973: 182-190
Informal and Other Publications
- 2021
- [i2]Maria Bada, Basie von Solms:
A Cybersecurity Guide for Using Fitness Devices. CoRR abs/2105.02933 (2021) - 2019
- [i1]Maria Bada, Basie von Solms, Ioannis Agrafiotis:
Reviewing National Cybersecurity Awareness for Users and Executives in Africa. CoRR abs/1910.01005 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint