<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="https://ir.unisa.ac.za/handle/10500/23890">
<title>South African Computer Journal 1996(17)</title>
<link>https://ir.unisa.ac.za/handle/10500/23890</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="https://ir.unisa.ac.za/handle/10500/24212"/>
<rdf:li rdf:resource="https://ir.unisa.ac.za/handle/10500/24210"/>
<rdf:li rdf:resource="https://ir.unisa.ac.za/handle/10500/24208"/>
<rdf:li rdf:resource="https://ir.unisa.ac.za/handle/10500/24205"/>
</rdf:Seq>
</items>
<dc:date>2026-05-05T15:11:40Z</dc:date>
</channel>
<item rdf:about="https://ir.unisa.ac.za/handle/10500/24212">
<title>A new framework for information security to avoid information anarchy</title>
<link>https://ir.unisa.ac.za/handle/10500/24212</link>
<description>A new framework for information security to avoid information anarchy
Parker, DB
It is reasoned that to preserve the three traditional elements of information security, confidentiality, integrity and availabil­ity, it is not sufficient to fully protect information. Three new elements are introduced: authenticity, utility and possession of information. Different scenarios are used to demonstrate that all six these elements are needed for comprehensive information protection.
</description>
<dc:date>1996-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://ir.unisa.ac.za/handle/10500/24210">
<title>Information security on the electronic superhighway</title>
<link>https://ir.unisa.ac.za/handle/10500/24210</link>
<description>Information security on the electronic superhighway
Von Solms, SH
This paper discusses a number of security protocols for the Internet and World Wide Web. The first two, SSL and SHTTP, provide general authentication, confidentiality and integrity facilities, while SEPP is a payment protocol, specifically de­signed for use in electronic purchasing.
</description>
<dc:date>1996-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://ir.unisa.ac.za/handle/10500/24208">
<title>Design of secure medical database systems</title>
<link>https://ir.unisa.ac.za/handle/10500/24208</link>
<description>Design of secure medical database systems
Pangalos, G; Khair, M
A database design methodology is presented in this paper which aims to improve the security of medical database systems. The proposed methodology is based on both the discretionary and the mandatory database security policies. It also sup­ports tuple-level granularity that helps to reduce the complexity encountered when supporting field-level granularity and minimises the number of fragments encountered when supporting table-level granularity. An experimental implementation of the proposed methodology in a major Greek hospital is also presented. The implementation has proved the usefulness of the proposals as well as their effectiveness in limiting the unauthorised access to the medical database, without severely restricting the capabilities of the system.
</description>
<dc:date>1996-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://ir.unisa.ac.za/handle/10500/24205">
<title>Functional and operational security system for open distributed environments</title>
<link>https://ir.unisa.ac.za/handle/10500/24205</link>
<description>Functional and operational security system for open distributed environments
Muftic, S
The paper describes the design details and implementation results of the completely integrated, functional and operational security system, suitable for open distributed environments. Functionality means that security system provides all ISO/OS/ security services and operability means that the described system is completely operational on various user platforms. The components of the system are smart cards, secure user workstations, integrated security clients, security servers and global certification system for international networks. Several security enhanced applications are also described in the paper: secure  PC based on smart cards, secure Internet E-mail (PEM ) and secure EDI, all based on the same concept of the security system, common security architecture and integrated security technologies and products.
</description>
<dc:date>1996-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
