Search the dblp DataBase
Martin S. Olivier :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Paul M. Boshoff , Martin S. Olivier Increasing Firewall Reliability by Recording Routes. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:303-314 [Conf ] Martin S. Olivier Using Workflow to Enhance Security in Federated Databases. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:60-71 [Conf ] Lucas C. J. Dreyer , Martin S. Olivier A Workbench for Privacy Policies. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1998, pp:350-355 [Conf ] Frans A. Lategan , Martin S. Olivier A Chinese Wall Approach to Privacy Policies for the Web. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:940-944 [Conf ] Lucas C. J. Dreyer , Martin S. Olivier Implementing Workflow Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:61-72 [Conf ] Lucas C. J. Dreyer , Martin S. Olivier An Information-Flow for Privacy (InfoPriv). [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:77-90 [Conf ] David Chadwick , Martin S. Olivier , Pierangela Samarati , Eleanor Sharpston , Bhavani M. Thuraisingham Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:331-346 [Conf ] Ehud Gudes , Martin S. Olivier Security Policies in Replicated and Autonomous Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:93-107 [Conf ] Ehud Gudes , Reind P. van de Riet , J. F. M. Burg , Martin S. Olivier Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:182-195 [Conf ] Alexandre Hardy , Martin S. Olivier A Configurable Security Architecture Prototype. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:51-62 [Conf ] Alexandre Hardy , Martin S. Olivier A Comparison Between ConSA and Current Linux Security Implementations. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:211-224 [Conf ] Martin S. Olivier Privacy under Conditions of Concurrent Interaction with Multiple Parties. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:105-118 [Conf ] Martin S. Olivier A Multilevel Secure Federated Database. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:183-198 [Conf ] Martin S. Olivier Self-protecting Objects in a Secure Federated Database. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:27-42 [Conf ] Martin S. Olivier Integrity Constraints in Federated Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:43-57 [Conf ] Martin S. Olivier , Ehud Gudes Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:149-160 [Conf ] David L. Spooner , Martin S. Olivier Selected Summary of Discussions. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:325-335 [Conf ] Wouter Teepe , Reind P. van de Riet , Martin S. Olivier WorkFlow Analyzed for Security and Privacy in using Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:271-282 [Conf ] Bhavani M. Thuraisingham , Sushil Jajodia , Pierangela Samarati , John E. Dobson , Martin S. Olivier Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:269-284 [Conf ] Reind P. van de Riet , Wouter Janssen , Martin S. Olivier , Radu Serban A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. [Citation Graph (0, 0)][DBLP ] DEXA, 2000, pp:287-301 [Conf ] Lucas C. J. Dreyer , Martin S. Olivier Dynamic Aspects of the InfoPriv Model for Information Privacy. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:340-345 [Conf ] Martin S. Olivier , Reind P. van de Riet , Ehud Gudes Specifying Application-Level Security in Workflow Systems. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:346-351 [Conf ] Hendrik J. G. Oberholzer , Martin S. Olivier Privacy Contracts as an Extension of Privacy Policies. [Citation Graph (0, 0)][DBLP ] ICDE Workshops, 2005, pp:1192- [Conf ] Wesley Brandi , Martin S. Olivier Maintaining Integrity within Mobile Self Protecting Objects. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 2001, pp:45-56 [Conf ] Bennie Fei , Jan H. P. Eloff , H. S. Venter , Martin S. Olivier Exploring Forensic Data with Self-Organizing Maps. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:113-123 [Conf ] Rut Laubscher , Cobus Rabe , Martin S. Olivier , Jan H. P. Eloff , H. S. Venter Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:105-112 [Conf ] Martin S. Olivier Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:17-31 [Conf ] T. Morkel , Jan H. P. Eloff , Martin S. Olivier Using Image Steganography for Decryptor Distribution. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:322-330 [Conf ] Frans A. Lategan , Martin S. Olivier Enforcing Privacy by Withholding Private Information. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:421-430 [Conf ] Martin S. Olivier , Sebastiaan H. von Solms DISCO - A Discretionary Security Model for Object-oriented Databases. [Citation Graph (0, 0)][DBLP ] SEC, 1992, pp:345-357 [Conf ] Johan S. von Solms , Martin S. Olivier , Sebastiaan H. von Solms MoFAC: a model for fine-grained access control. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:295-305 [Conf ] Thorsten Neumann , Heiko Tillwick , Martin S. Olivier Information Leakage in Ubiquitous Voice-over-IP Communications. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:233-242 [Conf ] Wesley Brandi , Martin S. Olivier Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:81-90 [Conf ] Wynand van Staden , Martin S. Olivier Extending SQL to Allow the Active Usage of Purposes. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:123-131 [Conf ] Frans A. Lategan , Martin S. Olivier On granting limited access to private information. [Citation Graph (0, 0)][DBLP ] WWW, 2001, pp:21-25 [Conf ] Martin S. Olivier , Sebastiaan H. von Solms Building a secure database using self-protecting objects. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:259-271 [Journal ] Hendrik J. G. Oberholzer , Martin S. Olivier Privacy contracts incorporated in a privacy protection framework. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2006, v:21, n:1, pp:- [Journal ] Martin S. Olivier , Ehud Gudes Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:43, n:3, pp:281-292 [Journal ] Martin S. Olivier Towards a configurable security architecture. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2001, v:38, n:2, pp:121-145 [Journal ] Wesley Brandi , Martin S. Olivier Maintaining Integrity within Mobile Self Protecting Objects. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal ] Ehud Gudes , Martin S. Olivier , Reind P. van de Riet Modeling, Specifying and Implementing Workflow Security in Cyberspace. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal ] Wouter Teepe , Reind P. van de Riet , Martin S. Olivier WorkFlow Analyzed for Security and Privacy in Using Databases. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:3, pp:353-364 [Journal ] Adéle Martins , Nico Martins , Martin S. Olivier Consumer perception of electronic-commerce. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2001, v:27, n:, pp:27-33 [Journal ] Martin S. Olivier Flocks : distributed proxies for browsing privacy. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2005, v:34, n:, pp:33-40 [Journal ] Frans A. Lategan , Martin S. Olivier PrivGuard : a model to protect private information based on its usage. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2002, v:29, n:, pp:58-68 [Journal ] Martin S. Olivier Database Privacy. [Citation Graph (0, 0)][DBLP ] SIGKDD Explorations, 2002, v:4, n:2, pp:20-27 [Journal ] Martin S. Olivier , Sebastiaan H. von Solms A Taxonomy for Secure Object-Oriented Databases. [Citation Graph (0, 7)][DBLP ] ACM Trans. Database Syst., 1994, v:19, n:1, pp:3-46 [Journal ] Dirk Kotze , Martin S. Olivier Patlet for Digital Forensics First Responders. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2007, pp:770-774 [Conf ] Wynand van Staden , Martin S. Olivier Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:201-209 [Conf ] Considerations Towards a Cyber Crime Profiling System. [Citation Graph (, )][DBLP ] Applying The Biba Integrity Model to Evidence Management. [Citation Graph (, )][DBLP ] Using Sensor Dirt for Toolmark Analysis of Digital Photographs. [Citation Graph (, )][DBLP ] An Evidence Acquisition Tool for Live Systems. [Citation Graph (, )][DBLP ] Analysis of Web Proxy Logs. [Citation Graph (, )][DBLP ] Logical Traffic Isolation Using Differentiated Services. [Citation Graph (, )][DBLP ] Applying Machine Trust Models to Forensic Investigations. [Citation Graph (, )][DBLP ] Active Traffic Capture for Network Forensics. [Citation Graph (, )][DBLP ] Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. [Citation Graph (, )][DBLP ] Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. [Citation Graph (, )][DBLP ] In Search of Search Privacy. [Citation Graph (, )][DBLP ] SQL's revoke with a view on privacy. [Citation Graph (, )][DBLP ] Emergency Privacy Measures. [Citation Graph (, )][DBLP ] UML Modelling of Digital Forensic Process Models (DFPMs). [Citation Graph (, )][DBLP ] Application of Message Digests for the Verification of Logical Forensic Data. [Citation Graph (, )][DBLP ] The Use of File Timestamps in Digital Forensics. [Citation Graph (, )][DBLP ] Framework for a Digital Forensic Investigation. [Citation Graph (, )][DBLP ] Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. [Citation Graph (, )][DBLP ] On bidder zones, cell phones and ballot stuffing. [Citation Graph (, )][DBLP ] Attacking Signed Binaries. [Citation Graph (, )][DBLP ] An overview of image steganography. [Citation Graph (, )][DBLP ] A comparison of simulated traffic conditioner performance. [Citation Graph (, )][DBLP ] On metadata context in Database Forensics. [Citation Graph (, )][DBLP ] On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation. [Citation Graph (, )][DBLP ] Search in 0.079secs, Finished in 0.081secs