dblp.uni-trier.dewww.uni-trier.de

Martin S. Olivier Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
73EEMartin S. Olivier: On metadata context in Database Forensics. Digital Investigation 5(3-4): 115-123 (2009)
2008
72EEKweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff: Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393
71EEMartin S. Olivier: Using Sensor Dirt for Toolmark Analysis of Digital Photographs. IFIP Int. Conf. Digital Forensics 2008: 193-206
70EERenico Koen, Martin S. Olivier: An Evidence Acquisition Tool for Live Systems. IFIP Int. Conf. Digital Forensics 2008: 325-334
69EEPontjho Mokhonoana, Martin S. Olivier: Application of Message Digests for the Verification of Logical Forensic Data. ISSA 2008: 1-11
68EEMichal Köhn, Jan H. P. Eloff, Martin S. Olivier: UML Modelling of Digital Forensic Process Models (DFPMs). ISSA 2008: 1-13
67EERenico Koen, Martin S. Olivier: The Use of File Timestamps in Digital Forensics. ISSA 2008: 1-16
66EEKamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie: Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. PST 2008: 56-64
65EEWesley Brandi, Martin S. Olivier, Alf Zugenmaier: Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. TrustBus 2008: 195-204
64EETinus Strauss, Derrick G. Kourie, Martin S. Olivier: A comparison of simulated traffic conditioner performance. Computer Communications 31(17): 3933-3940 (2008)
63EEHeiko Tillwick, Martin S. Olivier: Bridging the gap between anonymous e-mail and anonymous web browsing. Online Information Review 32(1): 22-34 (2008)
2007
62EEDirk Kotze, Martin S. Olivier: Patlet for Digital Forensics First Responders. DEXA Workshops 2007: 770-774
61EEKweku K. Arthur, Martin S. Olivier, Hein S. Venter: Applying The Biba Integrity Model to Evidence Management. IFIP Int. Conf. Digital Forensics 2007: 317-327
60EEWynand van Staden, Martin S. Olivier: SQL's revoke with a view on privacy. SAICSIT Conf. 2007: 181-188
59EEWynand van Staden, Martin S. Olivier: Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. TrustBus 2007: 201-209
2006
58 Martin S. Olivier, Sujeet Shenoi: Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006 Springer 2006
57 Marco Slaviero, Anna Granova, Martin S. Olivier: Active Traffic Capture for Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 215-228
56 Tinus Strauss, Martin S. Olivier, Derrick G. Kourie: Logical Traffic Isolation Using Differentiated Services. IFIP Int. Conf. Digital Forensics 2006: 229-237
55 Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter: Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258
54 Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier: Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65
53EEWesley Brandi, Martin S. Olivier: On bidder zones, cell phones and ballot stuffing. ISSA 2006: 1-11
52EENeil Croft, Martin S. Olivier: Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. ISSA 2006: 1-14
51EEMichael Kohn, Martin S. Olivier, Jan H. P. Eloff: Framework for a Digital Forensic Investigation. ISSA 2006: 1-7
50EET. Morkel, Jan H. P. Eloff, Martin S. Olivier: Using Image Steganography for Decryptor Distribution. OTM Workshops (1) 2006: 322-330
49EEWynand van Staden, Martin S. Olivier: Extending SQL to Allow the Active Usage of Purposes. TrustBus 2006: 123-131
48EEThorsten Neumann, Heiko Tillwick, Martin S. Olivier: Information Leakage in Ubiquitous Voice-over-IP Communications. TrustBus 2006: 233-242
47EEWesley Brandi, Martin S. Olivier: Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. TrustBus 2006: 81-90
46 Hendrik J. G. Oberholzer, Martin S. Olivier: Privacy contracts incorporated in a privacy protection framework. Comput. Syst. Sci. Eng. 21(1): (2006)
2005
45EEHendrik J. G. Oberholzer, Martin S. Olivier: Privacy Contracts as an Extension of Privacy Policies. ICDE Workshops 2005: 1192
44 Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter: Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112
43 Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier: Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123
42 Martin S. Olivier: Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. IFIP Int. Conf. Digital Forensics 2005: 17-31
41EEMarco Slaviero, Jaco Kroon, Martin S. Olivier: Attacking Signed Binaries. ISSA 2005: 1-10
40EET. Morkel, Jan H. P. Eloff, Martin S. Olivier: An overview of image steganography. ISSA 2005: 1-11
39 Martin S. Olivier: Flocks : distributed proxies for browsing privacy. South African Computer Journal 34: 33-40 (2005)
2003
38 Martin S. Olivier: Privacy under Conditions of Concurrent Interaction with Multiple Parties. DBSec 2003: 105-118
37 Wouter Teepe, Reind P. van de Riet, Martin S. Olivier: WorkFlow Analyzed for Security and Privacy in Using Databases. Journal of Computer Security 11(3): 353-364 (2003)
2002
36 Martin S. Olivier, David L. Spooner: Database and Application Security XV, IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada Kluwer 2002
35EEFrans A. Lategan, Martin S. Olivier: A Chinese Wall Approach to Privacy Policies for the Web. COMPSAC 2002: 940-944
34 David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham: Privacy and Civil Liberties. DBSec 2002: 331-346
33 Lucas C. J. Dreyer, Martin S. Olivier: Implementing Workflow Systems. DBSec 2002: 61-72
32EEMartin S. Olivier, Ehud Gudes: Wrappers - a mechanism to support state-based authorisation in Web applications. Data Knowl. Eng. 43(3): 281-292 (2002)
31 Wesley Brandi, Martin S. Olivier: Maintaining Integrity within Mobile Self Protecting Objects. Informatica (Slovenia) 26(2): (2002)
30EEMartin S. Olivier: Database Privacy. SIGKDD Explorations 4(2): 20-27 (2002)
29 Frans A. Lategan, Martin S. Olivier: PrivGuard : a model to protect private information based on its usage. South African Computer Journal 29: 58-68 (2002)
2001
28 Wesley Brandi, Martin S. Olivier: Maintaining Integrity within Mobile Self Protecting Objects. Conference on Information Security Management & Small Systems Security 2001: 45-56
27 Alexandre Hardy, Martin S. Olivier: A Comparison Between ConSA and Current Linux Security Implementations. DBSec 2001: 211-224
26 David L. Spooner, Martin S. Olivier: Selected Summary of Discussions. DBSec 2001: 325-335
25EEFrans A. Lategan, Martin S. Olivier: On granting limited access to private information. WWW 2001: 21-25
24EEMartin S. Olivier: Towards a configurable security architecture. Data Knowl. Eng. 38(2): 121-145 (2001)
23 Adéle Martins, Nico Martins, Martin S. Olivier: Consumer perception of electronic-commerce. South African Computer Journal 27: 27-33 (2001)
2000
22 Martin S. Olivier, Ehud Gudes: Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160
21 Wouter Teepe, Reind P. van de Riet, Martin S. Olivier: WorkFlow Analyzed for Security and Privacy in using Databases. DBSec 2000: 271-282
20 Alexandre Hardy, Martin S. Olivier: A Configurable Security Architecture Prototype. DBSec 2000: 51-62
19EEReind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban: A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. DEXA 2000: 287-301
18 Frans A. Lategan, Martin S. Olivier: Enforcing Privacy by Withholding Private Information. SEC 2000: 421-430
1999
17 Ehud Gudes, Martin S. Olivier, Reind P. van de Riet: Modeling, Specifying and Implementing Workflow Security in Cyberspace. Journal of Computer Security 7(4): (1999)
1998
16EELucas C. J. Dreyer, Martin S. Olivier: A Workbench for Privacy Policies. COMPSAC 1998: 350-355
15 Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier: Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284
14 Lucas C. J. Dreyer, Martin S. Olivier: An Information-Flow for Privacy (InfoPriv). DBSec 1998: 77-90
13 Ehud Gudes, Martin S. Olivier: Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107
12 Lucas C. J. Dreyer, Martin S. Olivier: Dynamic Aspects of the InfoPriv Model for Information Privacy. DEXA Workshop 1998: 340-345
11 Martin S. Olivier, Reind P. van de Riet, Ehud Gudes: Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351
1997
10 Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier: Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195
1996
9 Paul M. Boshoff, Martin S. Olivier: Increasing Firewall Reliability by Recording Routes. Communications and Multimedia Security 1996: 303-314
8 Martin S. Olivier: Using Workflow to Enhance Security in Federated Databases. Communications and Multimedia Security 1996: 60-71
7 Martin S. Olivier: Integrity Constraints in Federated Databases. DBSec 1996: 43-57
6 Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms: MoFAC: a model for fine-grained access control. SEC 1996: 295-305
1995
5 Martin S. Olivier: Self-protecting Objects in a Secure Federated Database. DBSec 1995: 27-42
1994
4 Martin S. Olivier: A Multilevel Secure Federated Database. DBSec 1994: 183-198
3EEMartin S. Olivier, Sebastiaan H. von Solms: A Taxonomy for Secure Object-Oriented Databases. ACM Trans. Database Syst. 19(1): 3-46 (1994)
1992
2 Martin S. Olivier, Sebastiaan H. von Solms: DISCO - A Discretionary Security Model for Object-oriented Databases. SEC 1992: 345-357
1EEMartin S. Olivier, Sebastiaan H. von Solms: Building a secure database using self-protecting objects. Computers & Security 11(3): 259-271 (1992)

Coauthor Index

1Kweku K. Arthur [61] [72]
2Paul M. Boshoff [9]
3Wesley Brandi [28] [31] [47] [53] [65]
4J. F. M. Burg [10]
5David Chadwick [34]
6Neil Croft [52]
7Iain Currie [66]
8John E. Dobson [15]
9Lucas C. J. Dreyer [12] [14] [16] [33]
10Jan H. P. Eloff [40] [43] [44] [50] [51] [54] [55] [68] [72]
11Bennie Fei [43] [55]
12Anna Granova [57]
13Ehud Gudes [10] [11] [13] [17] [22] [32]
14Alexandre Hardy [20] [27]
15Sushil Jajodia [15]
16Wouter Janssen [19]
17Renico Koen [67] [70]
18Michael Kohn [51]
19Michal Köhn [68]
20Dirk Kotze [62]
21Derrick G. Kourie [56] [64]
22Jaco Kroon [41]
23Frans A. Lategan [18] [25] [29] [35]
24Rut Laubscher [44]
25Adéle Martins [23]
26Nico Martins [23]
27Pontjho Mokhonoana [69]
28T. Morkel [40] [50]
29Thorsten Neumann [48]
30Hendrik J. G. Oberholzer [45] [46]
31Cobus Rabe [44]
32Kamil Reddy [66]
33Reind P. van de Riet [10] [11] [17] [19] [21] [37]
34Pierangela Samarati [15] [34]
35Radu Serban [19]
36Eleanor Sharpston [34]
37Sujeet Shenoi [58]
38Marco Slaviero [41] [57]
39Johan S. von Solms [6]
40Sebastiaan H. von Solms (Basie von Solms) [1] [2] [3] [6]
41David L. Spooner [26] [36]
42Wynand van Staden [49] [59] [60]
43Tinus Strauss [56] [64]
44Wouter Teepe [21] [37]
45Bhavani M. Thuraisingham [15] [34]
46Heiko Tillwick [48] [63]
47Hein S. Venter (H. S. Venter) [43] [44] [54] [55] [61] [66] [72]
48Marika Wojcik [54]
49Alf Zugenmaier [65]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)