School of Computing

PERSONAL PROFILE:

My ResearchGate Profile: Wynand JC Van Staden on ResearchGate

 

PGP Key:


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=2d0a
-----END PGP PUBLIC KEY BLOCK-----


SELECTED RECENT PUBLICATIONS

Journal publications

VSTADWJC (2015)
An Investigation into Reducing Third Party Privacy Breaches During the Investigation of Cybercrime
SAIEE Africa Research Journal
(6) 2
pp 74--82
View/download link: http://tinyurl.com/neyknze

VSTADWJC; Olivier, MS (2011)
On Compound Purposes and Compound Reasons for Enabling Privacy
Journal of Universal Computer Science
(17) 3
pp 426-450
View/download link: http://tinyurl.com/vanstaden-compound-purposes

Conference proceedings

Quintin White; VSTADWJC (2019)
South African Android Applications, their Security Permissions and Compliance with the Protection of Personal Information Act.
14th International Conference on Cyber Warfare and Security
Stellenbosch

VSTADWJC (2019)
Time-line Visualisation of Keywords
Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics
Orlando, Florida, USA

Nkosinathi Mpofu; VSTADWJC (2017)
Evaluating the Severity of Trust to Identity- Management-as-a-Service
2017 Information Security for South Africa
Rosebank,South Africa
978-1-5386-0544-8
pp 83-89

VSTADWJC; van der Poel, E (2016)
Team Formation in Digital Forensics
Information Security South Africa
Rosebank, South Africa
978-1-5090-2472-8

VSTADWJC (2014)
An Investigation into Reducing Third Party Privacy Breaches During the Investigation of Cybercrime
Proceedings of Information Security South Africa
Sandton
978-1-4799-3383-9

Nkosinathi Mpofu; VSTADWJC (2014)
A survey of trust issues constraining the growth of Identity Management-as-a-Service(IdMaaS)
Proceedings of Information Security South Africa
Sandton
978-1-4799-3383-9

VSTADWJC (2013)
Third Party Privacy and the Investigation of Cybercrime
Proceedings of the ninth annual IFIP 11.9 working group on digital forensics
Orlando, FL (USA)
978-3-642-41148-9

VSTADWJC; Olivier, MS (2007)
SQL's Revoke with a View on Privacy.
Proceedings of SAICSIT 2007
Fish River, South Africa
pp 181--187

VSTADWJC; Olivier, MS (2007)
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements
Regensburg, Germany
Springer-Verlag
pp 201-209

VSTADWJC; Olivier, MS (2006)
Extending SQL to Allow the Active Usage of Purposes
Krakow, Poland
Springer
pp 123-131

VSTADWJC; Olivier, MS (2004)
A Virtual Machine For Security In A Relational Database Management System
Midrand, South Africa
ISSA, Pretoria, South Africa
pp 1-13