Name
Papers
Collaborators
MARIJKE COETZEE
37
29
Citations 
PageRank 
Referers 
35
14.10
77
Referees 
References 
516
224
Search Limit
100516
Title
Citations
PageRank
Year
Access Control in Cyber-Physical Spaces Using Virtual Perimeters.00.342021
Simultaneous Deauthentication of Equals Attack.00.342020
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings00.342020
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers00.342019
A Comparison of Indoor Positioning Systems for Access Control Using Virtual Perimeters.10.362019
Access Control Requirements for Physical Spaces Protected by Virtual Perimeters.20.382018
The Design of an Identity and Access Management Assurance Dashboard Model.00.342018
Access control for secure information sharing in smart content spaces.10.372017
Engineering Secure Adaptable Web Services Compositions.00.342016
The Design of a Configurable Reputation Service10.392015
Argumentation-Based Group Decision Support for Collectivist Communities.00.342014
Introduction00.342014
TrustCV: Reputation-based trust for collectivist digital business ecosystems00.342014
Context-aware RESTful services on mobile devices.00.342013
Towards Reputation-as-a-Service30.422013
Towards trust and reputation for e-commerce in collectivist rural Africa.00.342012
Towards a Holistic Information Security Governance Framework for SOA10.382012
Web Services Security Policy Assertion Trade-offs00.342011
Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures.20.462011
Information Security for Service Oriented Computing: Ally or Antagonist00.342011
Towards Bluetooth multi-hop messaging00.342011
Towards an Information Security Framework for Service-Oriented Architecture.00.342010
Considering web services security policy compatibility.30.512010
A Web Services security policy assistant00.342010
Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks.20.532009
An Analysis of Authentication for Passive RFID Tags.00.342009
A Framework for Web Services Security Policy Negotiation.10.402009
BlueTrust in a Real World00.342008
The Information Security of a Bluetooth-Enabled Handheld Device00.342008
Analogue Fingerprinting for Passive RFID Tags00.342008
Web Services Access Control Architecture Incorporating Trust30.532007
A trust and context aware access control model for web services conversations90.712007
A Framework for Web Services Trust20.392006
Autonomous Trust For Web Services30.432005
Metadata for trust in service-oriented architectures00.342005
An access control framework for web services10.412005
A Logic-Based Access Control Approach For Web Services00.342004