Internationally Published Papers and Books
2009
von Solms, SH, von Solms, R, 2008/9, ‘Information Security Governance’, Springer International, New York, pp 142
2008
Kritzinger E, von Solms SH, 2008, ‘Information Security within an e-learning Environment’, Chapter XXI in the book ‘Handbook of Research on Social and Organizational Liabilities in Information Security’, Eds M Gupta and R Sharman, State University of New York, Buffalo, NY, USA, published by IGI Global, NY USA
2006
von Solms, SH, ‘Information Security – the Fourth Wave‘, Computers and Security, 2006, Vol 25, Nr 6, pp 165 – 168
von Solms, SH, von Solms, R, ‘Information Security Governance : A model based on the Direct-Control Cycle, Computers and Security, 2006, Vol 26, 6, pp 408-412
Von Solms R, von Solms SH, ‘Information Security Governance : Due Care’, Computers & Security, 2006, Vol 25, Nr 7, pp 494 – 497
Reekie C, von Solms, SH, ‘A Corporate Protection and Assurance Model‘, Lecture Notes in Computer Science (LNCS), Vol 4277, November 2006, Springer
von Solms, SH, Louwrens, C, ‘Chapter XI : The Relationship between Digital Forensics, Corporate Governance, IT Governance and IS Governance’,
in the book ‘Digital Crime and Forensic Science in Cyberspace’, Kanellis et al (Editors), IDEA Publishing Group, London, 2006, 339pp
2005
von Solms, SH, von Solms, R, 2005‘From information security to ... business security?’Computers Security, Vol 24, Nr 4, pp271 – 273
von Solms, SH, 2005 ‘Information Security Governance – Compliance Management vs Operational Management’ Computers Security, Vol 24, Nr 6, pp441 – 447
von Solms, SH, 2005‘Information Security Governance – COBIT or ISO 17700 or both?’Computers Security, Vol 24, Nr 2, pp97 – 104
2004
von Solms R. [Z]. von Solms S-H. [L].“From Policies to Culture”,
Computers & Security, 23, pp275 – 279
von Solms S-H. [L]. von Solms R. [Z].“The 10 deadly sins of information Security”,Computers & Security, 23, pp371 – 376
von Solms S-H. [L]. Marais E. [L].“From secure wired networks to secure wireless networks”,Computers & Security
von Solms, S-H. [L]. Hertenberger M-P. [D]. 2004.“A case for information ownership in ERP systems”,Proceedings of the 18th IFIP World Computer Conference,Kluwer Academic Press, pp135 – 149
Kritzinger E. [Z]. von Solms S-H. [L]. 2004.“Five non-technical pillars of network information security management”,Proceedings of the 8th IFIP TC6/TC11 Conference on Communications and Multimedia Security,Kluwer Academic Press, pp 317 – 327
Kritzinger E. [Z]. von Solms S-H. [L]. 2004.“The NOKIS Model - A Model for Non-Technical Aspects of Information Security”,Proceedings of the 10th International Conference on Information Systems Analysis and Synthesis and International Conference on Cybernetics and Information Technologies,
Systems and Applications 2004, 21 – 25 July,
2003
Pretorius E. [M]. von Solms S-H. [L]. 2003“Information Security Governance using ISO 17799 and CobiT”,Proceedings of the 6th IFIP TC11/WG 11.5 Working Conference on Integrity and Internal Control in Information Systems,
Kluwer Academic Press, pp 107 – 114
2001
Eloff MM, von Solms SH‘Information Security Management : An Approach to combine Process Certification, and product Certification’, Computers and Security, Vol 19, pp 698 – 709
Von Solms, R, von Solms SH‘Incremental Information Security Certification’
Computers and Security, Vol 19, p 615 – 620
Von Solms SH‘Corporate Governance and Information Security’Computers and Security, Vol 20, p 215 – 218
Von Solms SH‘Information Security – A multi-dimensional Discipline’Computers and Security, Vol 20, p 504 – 508
Von Solms, SH‘The Implementation of an Information Security Governance Structure for ESKOM – the national electricity utility of SA’18th World Conference on Computer Security, Audit and Control, 2001, London
2000
Von Solms, SH"Information Security-The Third Wave" Computers & Security, Vol 19, No 7, pp 615-620, 2000.
Eloff, MM, & Von Solms, SH"Information Security Management: A Hierarchical Framework for Various Approaches" Computers & Security, Vol 19, No 3, pp243-256, 2000.
1999
Von Solms, SH"The World Wide Web and Security Electronic Commerce"Encyclopedia of Telecommunications, Vol 18, pp 237-258, 1999.
Geldenhuys, JHS & Von Solms, SH"Managing Multilevel Security in a Military Internet Environment"Computers & Security, Vol 18, No 3, pp 257-270, 1999.
Von Solms, S.H., Geldenhys, J.H.S."Managing Multi Level Security in a Military intranet Environment"Computers & Security Vol 18,No 3, p257, 1999.
Von Solms, S.H"The World Wide Web and Secure Electronic Commerce"
The Froehlich/Kent ENCYCLOPEDIA OF TELECOMMUNICATIONS, Vol 18,pp237, Marcel Dekker, 1999.
1998
Geldenhuys, JHS, & Von Solms, SH"Collecting Security Baggage on the Internet"Computers & Security, Vol 17, No 4, pp 337-345, 1998.
Van der Merwe, J, & Von Solms, SH"Electronic Commerce with Secure Intelligent Trade Agents"Computers & Security, Vol 17, No 5, pp 435-446, 1998.
Von Solms, S.H., Geldenhys, J.H.S."Collecting Security Baggage on the Internet."Computer & Security, Vol17, No 4, pp 337, 1998
Van der Merwe, J., Von Solms, SH "Electronic Commerce with Secure Intelligent Trade Agents"Lecture Notes in Computer Science, Springer, 1998
Louwrens, C.P. [D], Von Solms, S.H."Can computerised immunity be achieved, based on a biological model?"Proceedings of the 14th International Conference on Information Security, Aug/Sept 1998, Wene/Budapest, pp 240-250
Von Solms, S.H. "Renaissance @ continent africa?" Aambeeld, Jaargang 26, No 2, pp 31-33,1998
Von Solms, S.H. "Information Security - An overview"Electron, Vol 15, No 5,pp63, 1998
Von Solms, S.H., Geldenhuys, J.H.S. [D]. "Collecting Security Baggage on the Internet"Computers & Security, Vol 17, No 4, pp 337-345, 1998
Van der Merwe, J. [D], von Solms, S.H."Electronic commerce with secure intelligent trade agents"Computers & Security, Vol 17, No 5, pp 435-446, 1998
1997
Van der Merwe, J, & Von Solms, SH"Electronic Commerce with Security Intelligent Trade Agents"Lecture Notes in Computer Science, Springer no 1334, pp 452-462, 1997.
Van Zyl, PWJ., Von Solms, SH "Roaming Security agents enabling intelligent access control and network protection"Proceedings of the 13th International Conference on Information Security (Sec '97), Copenhagen, May 1997
Van Rensburg,A., Von Solms, SH "A Comparison of schemes for certification authorities/Trusted third parties" Proceedings of the 13th International Conference on Information Security (Sec '97), Copenhagen, May 1997
Louwrens, CP Von Solms, SH"Selection of secure sign-on solutions for heterogeneous computing environments"Proceedings of the 13th International Conference on Information Security (Sec '97), Copenhagen, May 1997
1996
Von Solms, SH"Information Security - The Family member who came home (Edutorial)"South African Computer Journal, Vol 17, pp 1-3, Sept 1996.
Von Solms, S.H."Information security on the Electronic Superhighway."South African Computer Journal. Vol. 17, 1996.
1995
Von Solms, S.H. & Mostert, D. (Ph.D.student)"A Technique to Include Computer Security Safety and Resilience Requirements as part of the Requirements Specification"The Journal of Systems & Software, Vol. 13 No 1, 1995.
1994
Von Solms, S.H., Van der Merwe, I."The management of Computer Security Profiles using a role oriented approach."Computers & Security, Vol. 13, No 8, 1994.
Von Solms, S.H., Mostert, D.N.J. (Ph.D. student)"Methodology to Include Computer Security, Safety and Resilience as Part of User Requirements"Computers & Security, Vol. 13, 3, 1994
Von Solms, S.H., & von Solms R. (Ph.D.student), H. de Haar, W.J. Caelli"A Framework for Information Security Evaluation"Information & Management, 26, (1994), 143 - 153.
Von Solms, S.H., Olivier, M.S. (Ph.D.student)"A Taxonomy for Secure Object-Oriented Databases"(ACM Transactions on Database Systems, Vol. 19, No. 1, (1994)
1993
Von Solms, S.H., Von Solms, R. (Ph.D. student), Caelli, W.J."A Model for Information Security Management"Information Management & Computer Security, Vol. 1, No.3, 1993.
1992
Von Solms, S.H., Olivier, M.S. (Ph.D.student)"Building a Secure Database Using Self-Protecting Objects"Computers and Security, Vol. 11, 1992, pp 259 - 271.
1991
Von Solms, S.H., Pottas, D. (M-student)"A Computerized Management Reporting aid for a Mainframe Security System"Computers and Security, Vol. 10, 1991, pp 653 - 660.
1990
Von Solms, S.H., Eloff, J.H.P. & Von Solms, R.(M-student)"Computer Security Management: A Framework for Effective Management Control"Information Age, Vol. 12, 4, 1990, pp 217 - 222.
Von Solms, S.H. Boshoff W. (Ph.D.student)"The Application of a Path ContextApproach to Computer Security Fundamentals"Information Age, vol. 12, 2, 1990, pp 83 - 90.
1989
Von Solms, S.H., Edwards, N.G. (M-student)Designing and Implementing a New Security Model"Inter. Journal of Comp. Math., Vol. 29, 1989, pp 139 - 149.
Von Solms, S.H., Boshoff, W. (Ph.D.student)"A Path context Model for Addressing Security in a Potentially non-Secure Environment"Computers & Security, Vol. 8, 1989, pp 417 - 425.