Browsing Dept. of Computer Science by Author "Hutchison, Andrew"

Now showing items 1-8 of 8

  • Advancing security information and event management frameworks in managed enterprises using geolocation 

    Khan, Herah Anwar (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2015)
    Security Information and Event Management (SIEM) technology supports security threat detection and response through real-time and historical analysis of security events from a range of data sources. Through the retrieval ...

  • An architecture for secure searchable cloud storage 

    Koletka, Robert (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and can be reluctant to store their files on Cloud Storage Services. The problem is that Cloud ...

  • Augmenting security event information with contextual data to improve the detection capabilities of a SIEM 

    Bissict, Jason (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    The increasing number of cyber security breaches have revealed a need for proper cyber security measures. The emergence of the internet and the increase in overall connectivity means that data is more easily accessible and ...

  • Distributed authentication to preserve privacy through smart card based biometric matching 

    Nelte, Michael Andrew (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2000)
    This thesis focuses on privacy concerns, specifically those relating to the storage and use of biometrics. These concerns result from the fact that biometric information is unique. This uniqueness makes the biometric a ...

  • Facilitating the modelling and automated analysis of cryptographic protocols 

    Saul, Elton (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    Multi-dimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis and deployment techniques, thereby providing a higher level of confidence ...

  • Modelling adaptive routing in Wide Area Networks 

    Hutchison, Andrew (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1991)
    This study investigates the modelling of adative routing algorithms with specific reference to the algorithm of an existing Wide Area Network (WAN). Packets in the network are routed at each node on the basis of routing ...

  • Scalable attack modelling in support of security information and event management 

    Dennie, Keiran (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    While assessing security on single devices can be performed using vulnerability assessment tools, modelling of more intricate attacks, which incorporate multiple steps on different machines, requires more advanced techniques. ...

  • A transaction assurance framework for web services 

    Van Rooyen, Reinhardt (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)
    Trust assurances for customers of online transactions is an important, but not well implemented concept for the growth of confidence in electronic transactions. In an online world where customers do not personally know the ...