Skip to main content
  • Conference proceedings
  • © 2020

Information and Cyber Security

18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings

Part of the book series: Communications in Computer and Information Science (CCIS, volume 1166)

Conference series link(s): ISSA: International Information Security Conference

Conference proceedings info: ISSA 2019.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 papers)

  1. Front Matter

    Pages i-xvi
  2. Information Security Cost Reduction Through Social Means

    • Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock
    Pages 1-14
  3. An Aviation Sector CSIRT for Sub-Saharan Africa

    • Faith Lekota, Marijke Coetzee
    Pages 28-42
  4. Federation of Services from Autonomous Domains with Heterogeneous Access Control Models

    • Abdramane Bah, Pascal André, Christian Attiogbé, Jacqueline Konate
    Pages 83-98
  5. Theorising Information Security Policy Violations

    • Indren Govender, Bruce Watson
    Pages 131-144
  6. Back Matter

    Pages 173-173

Other Volumes

  1. Information and Cyber Security

About this book

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019.

The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

Editors and Affiliations

  • University of Pretoria, Pretoria, South Africa

    Hein Venter, Jan Eloff

  • University of South Africa, Florida, South Africa

    Marianne Loock

  • University of Johannesburg, Auckland Park, South Africa

    Marijke Coetzee

  • University of South Africa, Pretoria, South Africa

    Mariki Eloff

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access