The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Martin S. Olivier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paul M. Boshoff, Martin S. Olivier
    Increasing Firewall Reliability by Recording Routes. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:303-314 [Conf]
  2. Martin S. Olivier
    Using Workflow to Enhance Security in Federated Databases. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:60-71 [Conf]
  3. Lucas C. J. Dreyer, Martin S. Olivier
    A Workbench for Privacy Policies. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1998, pp:350-355 [Conf]
  4. Frans A. Lategan, Martin S. Olivier
    A Chinese Wall Approach to Privacy Policies for the Web. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:940-944 [Conf]
  5. Lucas C. J. Dreyer, Martin S. Olivier
    Implementing Workflow Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:61-72 [Conf]
  6. Lucas C. J. Dreyer, Martin S. Olivier
    An Information-Flow for Privacy (InfoPriv). [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:77-90 [Conf]
  7. David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham
    Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:331-346 [Conf]
  8. Ehud Gudes, Martin S. Olivier
    Security Policies in Replicated and Autonomous Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:93-107 [Conf]
  9. Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier
    Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:182-195 [Conf]
  10. Alexandre Hardy, Martin S. Olivier
    A Configurable Security Architecture Prototype. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:51-62 [Conf]
  11. Alexandre Hardy, Martin S. Olivier
    A Comparison Between ConSA and Current Linux Security Implementations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:211-224 [Conf]
  12. Martin S. Olivier
    Privacy under Conditions of Concurrent Interaction with Multiple Parties. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:105-118 [Conf]
  13. Martin S. Olivier
    A Multilevel Secure Federated Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:183-198 [Conf]
  14. Martin S. Olivier
    Self-protecting Objects in a Secure Federated Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:27-42 [Conf]
  15. Martin S. Olivier
    Integrity Constraints in Federated Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:43-57 [Conf]
  16. Martin S. Olivier, Ehud Gudes
    Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:149-160 [Conf]
  17. David L. Spooner, Martin S. Olivier
    Selected Summary of Discussions. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:325-335 [Conf]
  18. Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
    WorkFlow Analyzed for Security and Privacy in using Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:271-282 [Conf]
  19. Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier
    Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:269-284 [Conf]
  20. Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban
    A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. [Citation Graph (0, 0)][DBLP]
    DEXA, 2000, pp:287-301 [Conf]
  21. Lucas C. J. Dreyer, Martin S. Olivier
    Dynamic Aspects of the InfoPriv Model for Information Privacy. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:340-345 [Conf]
  22. Martin S. Olivier, Reind P. van de Riet, Ehud Gudes
    Specifying Application-Level Security in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:346-351 [Conf]
  23. Hendrik J. G. Oberholzer, Martin S. Olivier
    Privacy Contracts as an Extension of Privacy Policies. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2005, pp:1192- [Conf]
  24. Wesley Brandi, Martin S. Olivier
    Maintaining Integrity within Mobile Self Protecting Objects. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:45-56 [Conf]
  25. Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier
    Exploring Forensic Data with Self-Organizing Maps. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:113-123 [Conf]
  26. Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter
    Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:105-112 [Conf]
  27. Martin S. Olivier
    Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:17-31 [Conf]
  28. T. Morkel, Jan H. P. Eloff, Martin S. Olivier
    Using Image Steganography for Decryptor Distribution. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:322-330 [Conf]
  29. Frans A. Lategan, Martin S. Olivier
    Enforcing Privacy by Withholding Private Information. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:421-430 [Conf]
  30. Martin S. Olivier, Sebastiaan H. von Solms
    DISCO - A Discretionary Security Model for Object-oriented Databases. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:345-357 [Conf]
  31. Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms
    MoFAC: a model for fine-grained access control. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:295-305 [Conf]
  32. Thorsten Neumann, Heiko Tillwick, Martin S. Olivier
    Information Leakage in Ubiquitous Voice-over-IP Communications. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:233-242 [Conf]
  33. Wesley Brandi, Martin S. Olivier
    Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:81-90 [Conf]
  34. Wynand van Staden, Martin S. Olivier
    Extending SQL to Allow the Active Usage of Purposes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:123-131 [Conf]
  35. Frans A. Lategan, Martin S. Olivier
    On granting limited access to private information. [Citation Graph (0, 0)][DBLP]
    WWW, 2001, pp:21-25 [Conf]
  36. Martin S. Olivier, Sebastiaan H. von Solms
    Building a secure database using self-protecting objects. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:3, pp:259-271 [Journal]
  37. Hendrik J. G. Oberholzer, Martin S. Olivier
    Privacy contracts incorporated in a privacy protection framework. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2006, v:21, n:1, pp:- [Journal]
  38. Martin S. Olivier, Ehud Gudes
    Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:3, pp:281-292 [Journal]
  39. Martin S. Olivier
    Towards a configurable security architecture. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2001, v:38, n:2, pp:121-145 [Journal]
  40. Wesley Brandi, Martin S. Olivier
    Maintaining Integrity within Mobile Self Protecting Objects. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  41. Ehud Gudes, Martin S. Olivier, Reind P. van de Riet
    Modeling, Specifying and Implementing Workflow Security in Cyberspace. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal]
  42. Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
    WorkFlow Analyzed for Security and Privacy in Using Databases. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:353-364 [Journal]
  43. Adéle Martins, Nico Martins, Martin S. Olivier
    Consumer perception of electronic-commerce. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2001, v:27, n:, pp:27-33 [Journal]
  44. Martin S. Olivier
    Flocks : distributed proxies for browsing privacy. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2005, v:34, n:, pp:33-40 [Journal]
  45. Frans A. Lategan, Martin S. Olivier
    PrivGuard : a model to protect private information based on its usage. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2002, v:29, n:, pp:58-68 [Journal]
  46. Martin S. Olivier
    Database Privacy. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:20-27 [Journal]
  47. Martin S. Olivier, Sebastiaan H. von Solms
    A Taxonomy for Secure Object-Oriented Databases. [Citation Graph (0, 7)][DBLP]
    ACM Trans. Database Syst., 1994, v:19, n:1, pp:3-46 [Journal]
  48. Dirk Kotze, Martin S. Olivier
    Patlet for Digital Forensics First Responders. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:770-774 [Conf]
  49. Wynand van Staden, Martin S. Olivier
    Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:201-209 [Conf]

  50. Considerations Towards a Cyber Crime Profiling System. [Citation Graph (, )][DBLP]


  51. Applying The Biba Integrity Model to Evidence Management. [Citation Graph (, )][DBLP]


  52. Using Sensor Dirt for Toolmark Analysis of Digital Photographs. [Citation Graph (, )][DBLP]


  53. An Evidence Acquisition Tool for Live Systems. [Citation Graph (, )][DBLP]


  54. Analysis of Web Proxy Logs. [Citation Graph (, )][DBLP]


  55. Logical Traffic Isolation Using Differentiated Services. [Citation Graph (, )][DBLP]


  56. Applying Machine Trust Models to Forensic Investigations. [Citation Graph (, )][DBLP]


  57. Active Traffic Capture for Network Forensics. [Citation Graph (, )][DBLP]


  58. Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. [Citation Graph (, )][DBLP]


  59. Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. [Citation Graph (, )][DBLP]


  60. In Search of Search Privacy. [Citation Graph (, )][DBLP]


  61. SQL's revoke with a view on privacy. [Citation Graph (, )][DBLP]


  62. Emergency Privacy Measures. [Citation Graph (, )][DBLP]


  63. UML Modelling of Digital Forensic Process Models (DFPMs). [Citation Graph (, )][DBLP]


  64. Application of Message Digests for the Verification of Logical Forensic Data. [Citation Graph (, )][DBLP]


  65. The Use of File Timestamps in Digital Forensics. [Citation Graph (, )][DBLP]


  66. Framework for a Digital Forensic Investigation. [Citation Graph (, )][DBLP]


  67. Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. [Citation Graph (, )][DBLP]


  68. On bidder zones, cell phones and ballot stuffing. [Citation Graph (, )][DBLP]


  69. Attacking Signed Binaries. [Citation Graph (, )][DBLP]


  70. An overview of image steganography. [Citation Graph (, )][DBLP]


  71. A comparison of simulated traffic conditioner performance. [Citation Graph (, )][DBLP]


  72. On metadata context in Database Forensics. [Citation Graph (, )][DBLP]


  73. On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation. [Citation Graph (, )][DBLP]


Search in 0.079secs, Finished in 0.081secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002