Internationally Published Papers and Books

2009

von Solms, SH, von Solms, R, 2008/9, ‘Information Security Governance’, Springer International, New York, pp 142

2008

Kritzinger E, von Solms SH, 2008, ‘Information Security within an e-learning Environment’, Chapter XXI in the book ‘Handbook of Research on Social and Organizational Liabilities in Information Security’, Eds M Gupta and R Sharman, State University of New York, Buffalo, NY, USA, published by IGI Global, NY USA

2006

von Solms, SH, ‘Information Security – the Fourth Wave‘, Computers and Security, 2006, Vol 25, Nr 6, pp 165 – 168

von Solms, SH, von Solms, R, ‘Information Security Governance : A model based on the Direct-Control Cycle, Computers and Security, 2006, Vol 26, 6, pp 408-412

Von Solms R, von Solms SH, ‘Information Security Governance : Due Care’, Computers & Security, 2006, Vol 25, Nr 7, pp 494 – 497

Reekie C, von Solms, SH, ‘A Corporate Protection and Assurance Model‘, Lecture Notes in Computer Science (LNCS), Vol 4277, November 2006, Springer

von Solms, SH, Louwrens, C, ‘Chapter XI : The Relationship between Digital Forensics, Corporate Governance, IT Governance and IS Governance’,
in the book ‘Digital Crime and Forensic Science in Cyberspace’, Kanellis et al (Editors), IDEA Publishing Group, London, 2006, 339pp

2005

von Solms, SH, von Solms, R, 2005‘From information security to ... business security?’Computers Security, Vol 24, Nr 4, pp271 – 273

von Solms, SH, 2005 ‘Information Security Governance – Compliance Management vs Operational Management’ Computers Security, Vol 24, Nr 6, pp441 – 447

von Solms, SH, 2005‘Information Security Governance – COBIT or ISO 17700 or both?’Computers Security, Vol 24, Nr 2, pp97 – 104

2004

von Solms R. [Z]. von Solms S-H. [L].“From Policies to Culture”,
Computers & Security, 23, pp275 – 279

von Solms S-H. [L]. von Solms R. [Z].“The 10 deadly sins of information Security”,Computers & Security, 23, pp371 – 376

von Solms S-H. [L]. Marais E. [L].“From secure wired networks to secure wireless networks”,Computers & Security

von Solms, S-H. [L]. Hertenberger M-P. [D]. 2004.“A case for information ownership in ERP systems”,Proceedings of the 18th IFIP World Computer Conference,Kluwer Academic Press, pp135 – 149

Kritzinger E. [Z]. von Solms S-H. [L]. 2004.“Five non-technical pillars of network information security management”,Proceedings of the 8th IFIP TC6/TC11 Conference on Communications and Multimedia Security,Kluwer Academic Press, pp 317 – 327

Kritzinger E. [Z]. von Solms S-H. [L]. 2004.“The NOKIS Model - A Model for Non-Technical Aspects of Information Security”,Proceedings of the 10th International Conference on Information Systems Analysis and Synthesis and International Conference on Cybernetics and Information Technologies,
Systems and Applications 2004, 21 – 25 July,

2003

Pretorius E. [M]. von Solms S-H. [L]. 2003“Information Security Governance using ISO 17799 and CobiT”,Proceedings of the 6th IFIP TC11/WG 11.5 Working Conference on Integrity and Internal Control in Information Systems,
Kluwer Academic Press, pp 107 – 114

2001

Eloff MM, von Solms SH‘Information Security Management : An Approach to combine Process Certification, and product Certification’, Computers and Security, Vol 19, pp 698 – 709

Von Solms, R, von Solms SH‘Incremental Information Security Certification’
Computers and Security, Vol 19, p 615 – 620

Von Solms SH‘Corporate Governance and Information Security’Computers and Security, Vol 20, p 215 – 218

Von Solms SH‘Information Security – A multi-dimensional Discipline’Computers and Security, Vol 20, p 504 – 508

Von Solms, SH‘The Implementation of an Information Security Governance Structure for ESKOM – the national electricity utility of SA’18th World Conference on Computer Security, Audit and Control, 2001, London

2000

Von Solms, SH"Information Security-The Third Wave" Computers & Security, Vol 19, No 7, pp 615-620, 2000.

Eloff, MM, & Von Solms, SH"Information Security Management: A Hierarchical Framework for Various Approaches" Computers & Security, Vol 19, No 3, pp243-256, 2000.

1999

Von Solms, SH"The World Wide Web and Security Electronic Commerce"Encyclopedia of Telecommunications, Vol 18, pp 237-258, 1999.

Geldenhuys, JHS & Von Solms, SH"Managing Multilevel Security in a Military Internet Environment"Computers & Security, Vol 18, No 3, pp 257-270, 1999.
Von Solms, S.H., Geldenhys, J.H.S."Managing Multi Level Security in a Military intranet Environment"Computers & Security Vol 18,No 3, p257, 1999.
Von Solms, S.H"The World Wide Web and Secure Electronic Commerce"
The Froehlich/Kent ENCYCLOPEDIA OF TELECOMMUNICATIONS, Vol 18,pp237, Marcel Dekker, 1999.

1998

Geldenhuys, JHS, & Von Solms, SH"Collecting Security Baggage on the Internet"Computers & Security, Vol 17, No 4, pp 337-345, 1998.
Van der Merwe, J, & Von Solms, SH"Electronic Commerce with Secure Intelligent Trade Agents"Computers & Security, Vol 17, No 5, pp 435-446, 1998.
Von Solms, S.H., Geldenhys, J.H.S."Collecting Security Baggage on the Internet."Computer & Security, Vol17, No 4, pp 337, 1998

Van der Merwe, J., Von Solms, SH "Electronic Commerce with Secure Intelligent Trade Agents"Lecture Notes in Computer Science, Springer, 1998

Louwrens, C.P. [D], Von Solms, S.H."Can computerised immunity be achieved, based on a biological model?"Proceedings of the 14th International Conference on Information Security, Aug/Sept 1998, Wene/Budapest, pp 240-250

Von Solms, S.H. "Renaissance @ continent africa?" Aambeeld, Jaargang 26, No 2, pp 31-33,1998

Von Solms, S.H. "Information Security - An overview"Electron, Vol 15, No 5,pp63, 1998

Von Solms, S.H., Geldenhuys, J.H.S. [D]. "Collecting Security Baggage on the Internet"Computers & Security, Vol 17, No 4, pp 337-345, 1998

Van der Merwe, J. [D], von Solms, S.H."Electronic commerce with secure intelligent trade agents"Computers & Security, Vol 17, No 5, pp 435-446, 1998

1997

Van der Merwe, J, & Von Solms, SH"Electronic Commerce with Security Intelligent Trade Agents"Lecture Notes in Computer Science, Springer no 1334, pp 452-462, 1997.

Van Zyl, PWJ., Von Solms, SH "Roaming Security agents enabling intelligent access control and network protection"Proceedings of the 13th International Conference on Information Security (Sec '97), Copenhagen, May 1997

Van Rensburg,A., Von Solms, SH "A Comparison of schemes for certification authorities/Trusted third parties" Proceedings of the 13th International Conference on Information Security (Sec '97), Copenhagen, May 1997

Louwrens, CP Von Solms, SH"Selection of secure sign-on solutions for heterogeneous computing environments"Proceedings of the 13th International Conference on Information Security (Sec '97), Copenhagen, May 1997

1996

Von Solms, SH"Information Security - The Family member who came home (Edutorial)"South African Computer Journal, Vol 17, pp 1-3, Sept 1996.

Von Solms, S.H."Information security on the Electronic Superhighway."South African Computer Journal. Vol. 17, 1996.

1995

Von Solms, S.H. & Mostert, D. (Ph.D.student)"A Technique to Include Computer Security Safety and Resilience Requirements as part of the Requirements Specification"The Journal of Systems & Software, Vol. 13 No 1, 1995.

1994

Von Solms, S.H., Van der Merwe, I."The management of Computer Security Profiles using a role oriented approach."Computers & Security, Vol. 13, No 8, 1994.
Von Solms, S.H., Mostert, D.N.J. (Ph.D. student)"Methodology to Include Computer Security, Safety and Resilience as Part of User Requirements"Computers & Security, Vol. 13, 3, 1994

Von Solms, S.H., & von Solms R. (Ph.D.student), H. de Haar, W.J. Caelli"A Framework for Information Security Evaluation"Information & Management, 26, (1994), 143 - 153.

Von Solms, S.H., Olivier, M.S. (Ph.D.student)"A Taxonomy for Secure Object-Oriented Databases"(ACM Transactions on Database Systems, Vol. 19, No. 1, (1994)
1993

Von Solms, S.H., Von Solms, R. (Ph.D. student), Caelli, W.J."A Model for Information Security Management"Information Management & Computer Security, Vol. 1, No.3, 1993.

1992

Von Solms, S.H., Olivier, M.S. (Ph.D.student)"Building a Secure Database Using Self-Protecting Objects"Computers and Security, Vol. 11, 1992, pp 259 - 271.

1991

Von Solms, S.H., Pottas, D. (M-student)"A Computerized Management Reporting aid for a Mainframe Security System"Computers and Security, Vol. 10, 1991, pp 653 - 660.

1990

Von Solms, S.H., Eloff, J.H.P. & Von Solms, R.(M-student)"Computer Security Management: A Framework for Effective Management Control"Information Age, Vol. 12, 4, 1990, pp 217 - 222.

Von Solms, S.H. Boshoff W. (Ph.D.student)"The Application of a Path ContextApproach to Computer Security Fundamentals"Information Age, vol. 12, 2, 1990, pp 83 - 90.

1989

Von Solms, S.H., Edwards, N.G. (M-student)Designing and Implementing a New Security Model"Inter. Journal of Comp. Math., Vol. 29, 1989, pp 139 - 149.

Von Solms, S.H., Boshoff, W. (Ph.D.student)"A Path context Model for Addressing Security in a Potentially non-Secure Environment"Computers & Security, Vol. 8, 1989, pp 417 - 425.