2009 | ||
---|---|---|
77 | Hendrik J. G. Oberholzer, Martin S. Olivier: Emergency Privacy Measures. CSE (3) 2009: 324-329 | |
76 | Martin S. Olivier: On metadata context in Database Forensics. Digital Investigation 5(3-4): 115-123 (2009) | |
2008 | ||
75 | Kweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff: Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393 | |
74 | Martin S. Olivier: Using Sensor Dirt for Toolmark Analysis of Digital Photographs. IFIP Int. Conf. Digital Forensics 2008: 193-206 | |
73 | Renico Koen, Martin S. Olivier: An Evidence Acquisition Tool for Live Systems. IFIP Int. Conf. Digital Forensics 2008: 325-334 | |
72 | Pontjho Mokhonoana, Martin S. Olivier: Application of Message Digests for the Verification of Logical Forensic Data. ISSA 2008: 1-11 | |
71 | Michal Köhn, Jan H. P. Eloff, Martin S. Olivier: UML Modelling of Digital Forensic Process Models (DFPMs). ISSA 2008: 1-13 | |
70 | Renico Koen, Martin S. Olivier: The Use of File Timestamps in Digital Forensics. ISSA 2008: 1-16 | |
69 | Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie: Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. PST 2008: 56-64 | |
68 | Wesley Brandi, Martin S. Olivier, Alf Zugenmaier: Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. TrustBus 2008: 195-204 | |
67 | Tinus Strauss, Derrick G. Kourie, Martin S. Olivier: A comparison of simulated traffic conditioner performance. Computer Communications 31(17): 3933-3940 (2008) | |
66 | Heiko Tillwick, Martin S. Olivier: Bridging the gap between anonymous e-mail and anonymous web browsing. Online Information Review 32(1): 22-34 (2008) | |
2007 | ||
65 | Dirk Kotze, Martin S. Olivier: Patlet for Digital Forensics First Responders. DEXA Workshops 2007: 770-774 | |
64 | Kweku K. Arthur, Martin S. Olivier, Hein S. Venter: Applying The Biba Integrity Model to Evidence Management. IFIP Int. Conf. Digital Forensics 2007: 317-327 | |
63 | Wynand van Staden, Martin S. Olivier: SQL's revoke with a view on privacy. SAICSIT Conf. 2007: 181-188 | |
62 | Wynand van Staden, Martin S. Olivier: Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. TrustBus 2007: 201-209 | |
2006 | ||
61 | Martin S. Olivier, Sujeet Shenoi: Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006 Springer 2006 | |
60 | Marco Slaviero, Anna Granova, Martin S. Olivier: Active Traffic Capture for Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 215-228 | |
59 | Tinus Strauss, Martin S. Olivier, Derrick G. Kourie: Logical Traffic Isolation Using Differentiated Services. IFIP Int. Conf. Digital Forensics 2006: 229-237 | |
58 | Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter: Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258 | |
57 | Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier: Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65 | |
56 | Wesley Brandi, Martin S. Olivier: On bidder zones, cell phones and ballot stuffing. ISSA 2006: 1-11 | |
55 | Neil Croft, Martin S. Olivier: Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. ISSA 2006: 1-14 | |
54 | Michael Kohn, Martin S. Olivier, Jan H. P. Eloff: Framework for a Digital Forensic Investigation. ISSA 2006: 1-7 | |
53 | T. Morkel, Jan H. P. Eloff, Martin S. Olivier: Using Image Steganography for Decryptor Distribution. OTM Workshops (1) 2006: 322-330 | |
52 | Wynand van Staden, Martin S. Olivier: Extending SQL to Allow the Active Usage of Purposes. TrustBus 2006: 123-131 | |
51 | Thorsten Neumann, Heiko Tillwick, Martin S. Olivier: Information Leakage in Ubiquitous Voice-over-IP Communications. TrustBus 2006: 233-242 | |
50 | Wesley Brandi, Martin S. Olivier: Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. TrustBus 2006: 81-90 | |
49 | Hendrik J. G. Oberholzer, Martin S. Olivier: Privacy contracts incorporated in a privacy protection framework. Comput. Syst. Sci. Eng. 21(1): (2006) | |
2005 | ||
48 | Hendrik J. G. Oberholzer, Martin S. Olivier: Privacy Contracts as an Extension of Privacy Policies. ICDE Workshops 2005: 1192 | |
47 | Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter: Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112 | |
46 | Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier: Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123 | |
45 | Martin S. Olivier: Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. IFIP Int. Conf. Digital Forensics 2005: 17-31 | |
44 | Marco Slaviero, Jaco Kroon, Martin S. Olivier: Attacking Signed Binaries. ISSA 2005: 1-10 | |
43 | T. Morkel, Jan H. P. Eloff, Martin S. Olivier: An overview of image steganography. ISSA 2005: 1-11 | |
42 | Martin S. Olivier: Flocks : distributed proxies for browsing privacy. South African Computer Journal 34: 33-40 (2005) | |
2004 | ||
41 | Hein S. Venter, Martin S. Olivier, Jan H. P. Eloff: PIDS: a privacy intrusion detection system. Internet Research 14(5): 360-365 (2004) | |
40 | Martin S. Olivier: Using organisational safeguards to make justifiable privacy decisions when processing personal data. South African Computer Journal 33: 77-87 (2004) | |
2003 | ||
39 | Martin S. Olivier: Privacy under Conditions of Concurrent Interaction with Multiple Parties. DBSec 2003: 105-118 | |
38 | Wouter Teepe, Reind P. van de Riet, Martin S. Olivier: WorkFlow Analyzed for Security and Privacy in Using Databases. Journal of Computer Security 11(3): 353-364 (2003) | |
37 | Martin S. Olivier: A layered architecture for privacy - enhancing technologies. South African Computer Journal 31: 53-61 (2003) | |
2002 | ||
36 | Martin S. Olivier, David L. Spooner: Database and Application Security XV, IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada Kluwer 2002 | |
35 | Frans A. Lategan, Martin S. Olivier: A Chinese Wall Approach to Privacy Policies for the Web. COMPSAC 2002: 940-944 | |
34 | David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham: Privacy and Civil Liberties. DBSec 2002: 331-346 | |
33 | Lucas C. J. Dreyer, Martin S. Olivier: Implementing Workflow Systems. DBSec 2002: 61-72 | |
32 | Martin S. Olivier, Ehud Gudes: Wrappers - a mechanism to support state-based authorisation in Web applications. Data Knowl. Eng. 43(3): 281-292 (2002) | |
31 | Wesley Brandi, Martin S. Olivier: Maintaining Integrity within Mobile Self Protecting Objects. Informatica (Slovenia) 26(2): (2002) | |
30 | Martin S. Olivier: Database Privacy. SIGKDD Explorations 4(2): 20-27 (2002) | |
29 | Frans A. Lategan, Martin S. Olivier: PrivGuard : a model to protect private information based on its usage. South African Computer Journal 29: 58-68 (2002) | |
2001 | ||
28 | Wesley Brandi, Martin S. Olivier: Maintaining Integrity within Mobile Self Protecting Objects. Conference on Information Security Management & Small Systems Security 2001: 45-56 | |
27 | Alexandre Hardy, Martin S. Olivier: A Comparison Between ConSA and Current Linux Security Implementations. DBSec 2001: 211-224 | |
26 | David L. Spooner, Martin S. Olivier: Selected Summary of Discussions. DBSec 2001: 325-335 | |
25 | Frans A. Lategan, Martin S. Olivier: On granting limited access to private information. WWW 2001: 21-25 | |
24 | Martin S. Olivier: Towards a configurable security architecture. Data Knowl. Eng. 38(2): 121-145 (2001) | |
23 | Adéle Martins, Nico Martins, Martin S. Olivier: Consumer perception of electronic-commerce. South African Computer Journal 27: 27-33 (2001) | |
2000 | ||
22 | Martin S. Olivier, Ehud Gudes: Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160 | |
21 | Wouter Teepe, Reind P. van de Riet, Martin S. Olivier: WorkFlow Analyzed for Security and Privacy in using Databases. DBSec 2000: 271-282 | |
20 | Alexandre Hardy, Martin S. Olivier: A Configurable Security Architecture Prototype. DBSec 2000: 51-62 | |
19 | Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban: A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. DEXA 2000: 287-301 | |
18 | Frans A. Lategan, Martin S. Olivier: Enforcing Privacy by Withholding Private Information. SEC 2000: 421-430 | |
1999 | ||
17 | Ehud Gudes, Martin S. Olivier, Reind P. van de Riet: Modeling, Specifying and Implementing Workflow Security in Cyberspace. Journal of Computer Security 7(4): (1999) | |
1998 | ||
16 | Lucas C. J. Dreyer, Martin S. Olivier: A Workbench for Privacy Policies. COMPSAC 1998: 350-355 | |
15 | Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier: Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284 | |
14 | Lucas C. J. Dreyer, Martin S. Olivier: An Information-Flow for Privacy (InfoPriv). DBSec 1998: 77-90 | |
13 | Ehud Gudes, Martin S. Olivier: Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107 | |
12 | Lucas C. J. Dreyer, Martin S. Olivier: Dynamic Aspects of the InfoPriv Model for Information Privacy. DEXA Workshop 1998: 340-345 | |
11 | Martin S. Olivier, Reind P. van de Riet, Ehud Gudes: Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351 | |
1997 | ||
10 | Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier: Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195 | |
1996 | ||
9 | Paul M. Boshoff, Martin S. Olivier: Increasing Firewall Reliability by Recording Routes. Communications and Multimedia Security 1996: 303-314 | |
8 | Martin S. Olivier: Using Workflow to Enhance Security in Federated Databases. Communications and Multimedia Security 1996: 60-71 | |
7 | Martin S. Olivier: Integrity Constraints in Federated Databases. DBSec 1996: 43-57 | |
6 | Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms: MoFAC: a model for fine-grained access control. SEC 1996: 295-305 | |
1995 | ||
5 | Martin S. Olivier: Self-protecting Objects in a Secure Federated Database. DBSec 1995: 27-42 | |
1994 | ||
4 | Martin S. Olivier: A Multilevel Secure Federated Database. DBSec 1994: 183-198 | |
3 | Martin S. Olivier, Sebastiaan H. von Solms: A Taxonomy for Secure Object-Oriented Databases. ACM Trans. Database Syst. 19(1): 3-46 (1994) | |
1992 | ||
2 | Martin S. Olivier, Sebastiaan H. von Solms: DISCO - A Discretionary Security Model for Object-oriented Databases. SEC 1992: 345-357 | |
1 | Martin S. Olivier, Sebastiaan H. von Solms: Building a secure database using self-protecting objects. Computers & Security 11(3): 259-271 (1992) |