2009 |
72 | EE | Martin S. Olivier:
On metadata context in Database Forensics.
Digital Investigation 5(3-4): 115-123 (2009) |
2008 |
71 | EE | Kweku K. Arthur,
Martin S. Olivier,
Hein S. Venter,
Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System.
ARES 2008: 1388-1393 |
70 | EE | Martin S. Olivier:
Using Sensor Dirt for Toolmark Analysis of Digital Photographs.
IFIP Int. Conf. Digital Forensics 2008: 193-206 |
69 | EE | Renico Koen,
Martin S. Olivier:
An Evidence Acquisition Tool for Live Systems.
IFIP Int. Conf. Digital Forensics 2008: 325-334 |
68 | EE | Pontjho Mokhonoana,
Martin S. Olivier:
Application of Message Digests for the Verification of Logical Forensic Data.
ISSA 2008: 1-11 |
67 | EE | Michal Köhn,
Jan H. P. Eloff,
Martin S. Olivier:
UML Modelling of Digital Forensic Process Models (DFPMs).
ISSA 2008: 1-13 |
66 | EE | Renico Koen,
Martin S. Olivier:
The Use of File Timestamps in Digital Forensics.
ISSA 2008: 1-16 |
65 | EE | Kamil Reddy,
H. S. Venter,
Martin S. Olivier,
Iain Currie:
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy.
PST 2008: 56-64 |
64 | EE | Wesley Brandi,
Martin S. Olivier,
Alf Zugenmaier:
Preservation of Privacy in Thwarting the Ballot Stuffing Scheme.
TrustBus 2008: 195-204 |
63 | EE | Tinus Strauss,
Derrick G. Kourie,
Martin S. Olivier:
A comparison of simulated traffic conditioner performance.
Computer Communications 31(17): 3933-3940 (2008) |
2007 |
62 | EE | Dirk Kotze,
Martin S. Olivier:
Patlet for Digital Forensics First Responders.
DEXA Workshops 2007: 770-774 |
61 | EE | Kweku K. Arthur,
Martin S. Olivier,
Hein S. Venter:
Applying The Biba Integrity Model to Evidence Management.
IFIP Int. Conf. Digital Forensics 2007: 317-327 |
60 | EE | Wynand van Staden,
Martin S. Olivier:
SQL's revoke with a view on privacy.
SAICSIT Conf. 2007: 181-188 |
59 | EE | Wynand van Staden,
Martin S. Olivier:
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements.
TrustBus 2007: 201-209 |
2006 |
58 | | Martin S. Olivier,
Sujeet Shenoi:
Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006
Springer 2006 |
57 | | Marco Slaviero,
Anna Granova,
Martin S. Olivier:
Active Traffic Capture for Network Forensics.
IFIP Int. Conf. Digital Forensics 2006: 215-228 |
56 | | Tinus Strauss,
Martin S. Olivier,
Derrick G. Kourie:
Logical Traffic Isolation Using Differentiated Services.
IFIP Int. Conf. Digital Forensics 2006: 229-237 |
55 | | Bennie Fei,
Jan H. P. Eloff,
Martin S. Olivier,
Hein S. Venter:
Analysis of Web Proxy Logs.
IFIP Int. Conf. Digital Forensics 2006: 247-258 |
54 | | Marika Wojcik,
Hein S. Venter,
Jan H. P. Eloff,
Martin S. Olivier:
Applying Machine Trust Models to Forensic Investigations.
IFIP Int. Conf. Digital Forensics 2006: 55-65 |
53 | EE | Wesley Brandi,
Martin S. Olivier:
On bidder zones, cell phones and ballot stuffing.
ISSA 2006: 1-11 |
52 | EE | Neil Croft,
Martin S. Olivier:
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation.
ISSA 2006: 1-14 |
51 | EE | Michael Kohn,
Martin S. Olivier,
Jan H. P. Eloff:
Framework for a Digital Forensic Investigation.
ISSA 2006: 1-7 |
50 | EE | T. Morkel,
Jan H. P. Eloff,
Martin S. Olivier:
Using Image Steganography for Decryptor Distribution.
OTM Workshops (1) 2006: 322-330 |
49 | EE | Wynand van Staden,
Martin S. Olivier:
Extending SQL to Allow the Active Usage of Purposes.
TrustBus 2006: 123-131 |
48 | EE | Thorsten Neumann,
Heiko Tillwick,
Martin S. Olivier:
Information Leakage in Ubiquitous Voice-over-IP Communications.
TrustBus 2006: 233-242 |
47 | EE | Wesley Brandi,
Martin S. Olivier:
Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy.
TrustBus 2006: 81-90 |
46 | | Hendrik J. G. Oberholzer,
Martin S. Olivier:
Privacy contracts incorporated in a privacy protection framework.
Comput. Syst. Sci. Eng. 21(1): (2006) |
2005 |
45 | EE | Hendrik J. G. Oberholzer,
Martin S. Olivier:
Privacy Contracts as an Extension of Privacy Policies.
ICDE Workshops 2005: 1192 |
44 | | Rut Laubscher,
Cobus Rabe,
Martin S. Olivier,
Jan H. P. Eloff,
H. S. Venter:
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.
IFIP Int. Conf. Digital Forensics 2005: 105-112 |
43 | | Bennie Fei,
Jan H. P. Eloff,
H. S. Venter,
Martin S. Olivier:
Exploring Forensic Data with Self-Organizing Maps.
IFIP Int. Conf. Digital Forensics 2005: 113-123 |
42 | | Martin S. Olivier:
Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks.
IFIP Int. Conf. Digital Forensics 2005: 17-31 |
41 | EE | Marco Slaviero,
Jaco Kroon,
Martin S. Olivier:
Attacking Signed Binaries.
ISSA 2005: 1-10 |
40 | EE | T. Morkel,
Jan H. P. Eloff,
Martin S. Olivier:
An overview of image steganography.
ISSA 2005: 1-11 |
39 | | Martin S. Olivier:
Flocks : distributed proxies for browsing privacy.
South African Computer Journal 34: 33-40 (2005) |
2003 |
38 | | Martin S. Olivier:
Privacy under Conditions of Concurrent Interaction with Multiple Parties.
DBSec 2003: 105-118 |
37 | | Wouter Teepe,
Reind P. van de Riet,
Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in Using Databases.
Journal of Computer Security 11(3): 353-364 (2003) |
2002 |
36 | | Martin S. Olivier,
David L. Spooner:
Database and Application Security XV, IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada
Kluwer 2002 |
35 | EE | Frans A. Lategan,
Martin S. Olivier:
A Chinese Wall Approach to Privacy Policies for the Web.
COMPSAC 2002: 940-944 |
34 | | David Chadwick,
Martin S. Olivier,
Pierangela Samarati,
Eleanor Sharpston,
Bhavani M. Thuraisingham:
Privacy and Civil Liberties.
DBSec 2002: 331-346 |
33 | | Lucas C. J. Dreyer,
Martin S. Olivier:
Implementing Workflow Systems.
DBSec 2002: 61-72 |
32 | EE | Martin S. Olivier,
Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications.
Data Knowl. Eng. 43(3): 281-292 (2002) |
31 | | Wesley Brandi,
Martin S. Olivier:
Maintaining Integrity within Mobile Self Protecting Objects.
Informatica (Slovenia) 26(2): (2002) |
30 | EE | Martin S. Olivier:
Database Privacy.
SIGKDD Explorations 4(2): 20-27 (2002) |
29 | | Frans A. Lategan,
Martin S. Olivier:
PrivGuard : a model to protect private information based on its usage.
South African Computer Journal 29: 58-68 (2002) |
2001 |
28 | | Wesley Brandi,
Martin S. Olivier:
Maintaining Integrity within Mobile Self Protecting Objects.
Conference on Information Security Management & Small Systems Security 2001: 45-56 |
27 | | Alexandre Hardy,
Martin S. Olivier:
A Comparison Between ConSA and Current Linux Security Implementations.
DBSec 2001: 211-224 |
26 | | David L. Spooner,
Martin S. Olivier:
Selected Summary of Discussions.
DBSec 2001: 325-335 |
25 | EE | Frans A. Lategan,
Martin S. Olivier:
On granting limited access to private information.
WWW 2001: 21-25 |
24 | EE | Martin S. Olivier:
Towards a configurable security architecture.
Data Knowl. Eng. 38(2): 121-145 (2001) |
23 | | Adéle Martins,
Nico Martins,
Martin S. Olivier:
Consumer perception of electronic-commerce.
South African Computer Journal 27: 27-33 (2001) |
2000 |
22 | | Martin S. Olivier,
Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications.
DBSec 2000: 149-160 |
21 | | Wouter Teepe,
Reind P. van de Riet,
Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in using Databases.
DBSec 2000: 271-282 |
20 | | Alexandre Hardy,
Martin S. Olivier:
A Configurable Security Architecture Prototype.
DBSec 2000: 51-62 |
19 | EE | Reind P. van de Riet,
Wouter Janssen,
Martin S. Olivier,
Radu Serban:
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace.
DEXA 2000: 287-301 |
18 | | Frans A. Lategan,
Martin S. Olivier:
Enforcing Privacy by Withholding Private Information.
SEC 2000: 421-430 |
1999 |
17 | | Ehud Gudes,
Martin S. Olivier,
Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace.
Journal of Computer Security 7(4): (1999) |
1998 |
16 | EE | Lucas C. J. Dreyer,
Martin S. Olivier:
A Workbench for Privacy Policies.
COMPSAC 1998: 350-355 |
15 | | Bhavani M. Thuraisingham,
Sushil Jajodia,
Pierangela Samarati,
John E. Dobson,
Martin S. Olivier:
Security and Privacy Issues for the World Wide Web: Panel Discussion.
DBSec 1998: 269-284 |
14 | | Lucas C. J. Dreyer,
Martin S. Olivier:
An Information-Flow for Privacy (InfoPriv).
DBSec 1998: 77-90 |
13 | | Ehud Gudes,
Martin S. Olivier:
Security Policies in Replicated and Autonomous Databases.
DBSec 1998: 93-107 |
12 | | Lucas C. J. Dreyer,
Martin S. Olivier:
Dynamic Aspects of the InfoPriv Model for Information Privacy.
DEXA Workshop 1998: 340-345 |
11 | | Martin S. Olivier,
Reind P. van de Riet,
Ehud Gudes:
Specifying Application-Level Security in Workflow Systems.
DEXA Workshop 1998: 346-351 |
1997 |
10 | | Ehud Gudes,
Reind P. van de Riet,
J. F. M. Burg,
Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
DBSec 1997: 182-195 |
1996 |
9 | | Paul M. Boshoff,
Martin S. Olivier:
Increasing Firewall Reliability by Recording Routes.
Communications and Multimedia Security 1996: 303-314 |
8 | | Martin S. Olivier:
Using Workflow to Enhance Security in Federated Databases.
Communications and Multimedia Security 1996: 60-71 |
7 | | Martin S. Olivier:
Integrity Constraints in Federated Databases.
DBSec 1996: 43-57 |
6 | | Johan S. von Solms,
Martin S. Olivier,
Sebastiaan H. von Solms:
MoFAC: a model for fine-grained access control.
SEC 1996: 295-305 |
1995 |
5 | | Martin S. Olivier:
Self-protecting Objects in a Secure Federated Database.
DBSec 1995: 27-42 |
1994 |
4 | | Martin S. Olivier:
A Multilevel Secure Federated Database.
DBSec 1994: 183-198 |
3 | EE | Martin S. Olivier,
Sebastiaan H. von Solms:
A Taxonomy for Secure Object-Oriented Databases.
ACM Trans. Database Syst. 19(1): 3-46 (1994) |
1992 |
2 | | Martin S. Olivier,
Sebastiaan H. von Solms:
DISCO - A Discretionary Security Model for Object-oriented Databases.
SEC 1992: 345-357 |
1 | EE | Martin S. Olivier,
Sebastiaan H. von Solms:
Building a secure database using self-protecting objects.
Computers & Security 11(3): 259-271 (1992) |