Reinhardt A. Botha
Reinhardt A. Botha
Professor of Information Technology, Nelson Mandela University, Port Elizabeth
Verified email at nmmu.ac.za
Title
Cited by
Cited by
Year
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM Systems Journal 40 (3), 666-682, 2001
2912001
From desktop to mobile: Examining the security experience
RA Botha, SM Furnell, NL Clarke
Computers & Security 28 (3-4), 130-137, 2009
1272009
A context-sensitive access control model and prototype implementation
DG Cholewka, RA Botha, JHP Eloff
IFIP International Information Security Conference, 341-350, 2000
512000
Access control in document-centric workflow systems—an agent-based approach
RA Botha, JHP Eloff
Computers & Security 20 (6), 525-532, 2001
452001
Designing role hierarchies for access control in workflow systems
RA Botha, JHP Eloff
25th Annual International Computer Software and Applications Conference…, 2001
402001
A framework for access control in workflow systems
RA Botha, JHP Eloff
Information management & computer security, 2001
402001
Perceptions of user authentication on mobile devices
S Karatzouni, SM Furnell, NL Clarke, RA Botha
Proceedings of the ISOneWorld Conference, 11-13, 2007
332007
CoSAWoE-a model for context-sensitive access control in workflow environments.
RA Botha
Rand Afrikaans University, 2001
332001
An investigation into access control for mobile devices
S Perelson, R Botha
ISSA 2004, 2004
262004
Reflecting on 20 SEC conferences
RA Botha, TG Gaadingwe
Computers & Security 25 (4), 247-256, 2006
252006
Safeguarding information as an asset: Do we need a redefinition in the knowledge economy and beyond?
AK Adesemowo, R Von Solms, RA Botha
South African Journal of Information Management 18 (1), 1-12, 2016
192016
Secure mobile device use in healthcare guidance from HIPAA and ISO17799
G Thomas, RA Botha
Information Systems Management 24 (4), 333-342, 2007
192007
Social networks–access all areas?
S Furnell, RA Botha
Computer Fraud & Security 2011 (5), 14-19, 2011
172011
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
S Perelson, RA Botha
South African Computer Journal 2000 (26), 212-216, 2000
162000
A security interpretation of the workflow reference model
RA Botha, JHP Eloff
Information Security-from Small systems to management of secure…, 1998
141998
Seven characteristics of a successful virtual volunteering platform
L Butgereit
2011 IST-Africa Conference Proceedings, 1-8, 2011
102011
A model to identify mathematics topics in MXit lingo to provide tutors quick access to supporting documentation
L Butgereit, RA Botha
pythagoras 32 (2), 1-11, 2011
102011
Understanding the impact of default privacy settings on self-disclosure in social networking services: Building a conceptual model and measurement instrument
M Tschersich, RA Botha
92013
Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math
L Butgereit, RA Botha
TD: The Journal for Transdisciplinary Research in Southern Africa 8 (1), 30-50, 2012
92012
Dr math moves to CTO: Chatter call center/tutoring online
L Butgereit, RA Botha
92010
The system can't perform the operation now. Try again later.
Articles 1–20