Publications
All Topics
[ Full text Paper available] [ Full (protected) Paper available upon request] [ Abstract Abstract]
[ BibTeX entry
BibTeX reference entry] [ Publisher site Authoritative version of paper on publisher’s
site]
2024
- Examination of Customized Questioned Digital Documents
Abstract
BibTeX entry
O. M. Adedayo and M. S. Olivier. “Examination of Customized Questioned Digital Documents”. In: Journal of Forensic Sciences (2024). Accepted for publication - On determining the age of questioned digital
documents
Full text
Abstract
BibTeX entry
M. S. Olivier. “On determining the age of questioned digital documents”. In: Advances in Digital Forensics XX. Ed. by E Kurkowski and S Shenoi. Advances in Information and Communication Technology. In press. Springer, 2024
2022
- The Examination of Questioned
Digital Documents Customized From a Database
Abstract
BibTeX entry
O. M. Adedayo and M. S. Olivier. “The Examination of Questioned Digital Documents Customized From a Database”. In: AAFS 73rd Annual Scientific Meeting. (Oral presentation; abstract included in proceedings). Seattle, WA, USA, Feb. 2022
2021
- Using programmed execution as a scientific principle for
examining questioned digital documents
Abstract
BibTeX entry
M. S. Olivier. “Using programmed execution as a scientific principle for examining questioned digital documents”. In: Current Problems of Forensic Expertology, Criminalistics and Criminal Procedure. Invited presentation. Kyiv Scientific Research Institute of Forensic Expertise, Ministry of Justice of Ukraine, Dec. 2021, pp. 27–31 -
The Questions of Digital Forensics — Cues from Forensic Science
BibTeX entry
M. S. Olivier. “The Questions of Digital Forensics — Cues from Forensic Science”. In: Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics. Invited keynote presentation. Online, Feb. 2021 - The
links between digital forensics and the metaphorical physical bases of digital
constructs
Abstract
BibTeX entry
M. S. Olivier. “The links between digital forensics and the metaphorical physical bases of digital constructs”. In: International Association of Forensic Sciences (IAFS2020) meeting. Accepted for presentation; conference cancelled due to Covid-19. Sydney, Australia, May 2021
2020
-
The Authenticity of Questioned Pretty Good Privacy (PGP)-Signed Digital
Documents
Abstract
BibTeX entry
M. S. Olivier. “The Authenticity of Questioned Pretty Good Privacy (PGP)-Signed Digital Documents”. In: AAFS 72nd Annual Scientific Meeting. (Oral presentation; abstract included in proceedings). Anaheim, CA, USA, Feb. 2020 - On Generic Digital Forensic Readiness
Abstract
BibTeX entry
M. S. Olivier. “On Generic Digital Forensic Readiness”. In: AAFS 72nd Annual Scientific Meeting. (Oral presentation; abstract included in proceedings). Anaheim, CA, USA, Feb. 2020 - Digital forensics and the big data
deluge — some concerns based on Ramsey Theory
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Digital forensics and the big data deluge — some concerns based on Ramsey Theory”. In: Advances in Digital Forensics XVI. Ed. by G Peterson and S Shenoi. Advances in Information and Communication Technology. Springer, 2020, pp. 3–23
2019
- Medico-legal examinations as a
paradigm for digital examinations
Abstract
BibTeX entry
M. S. Olivier. “Medico-legal examinations as a paradigm for digital examinations”. In: Program and Abstracts — The Eleventh ISABS Conference on Forensic and Anthropologic Genetics and Mayo Clinic Lectures in Individualized Medicine. Ed. by D. Primorac, M. Schanfield, S. Vuc-Pavlović, M. Kayser, and T. Ördög. Invited paper. International Society for Applied and Biological Sciences, June 2019, p. 97 -
Evaluation of Smartphone Data using a Reference Architecture
Abstract
BibTeX entry
Publisher site
H. Pieterse, M. S. Olivier, and R. van Heerden. “Evaluation of Smartphone Data using a Reference Architecture”. In: International Journal of Electronic Security and Digital Forensics 11.2 (2019), pp. 160–182 - Classifying the
Authenticity of Evaluated Smartphone Data
Abstract
BibTeX entry
Publisher site
H. Pieterse, M. S. Olivier, and R. van Heerden. “Classifying the Authenticity of Evaluated Smartphone Data”. In: Advances in Digital Forensics XV. Ed. by G Peterson and S Shenoi. Advances in Information and Communication Technology. Springer, 2019, pp. 39–57 - Detecting Manipulated Smartphone Data on
Android and iOS Devices
Abstract
BibTeX entry
Publisher site
H. Pieterse, M. S. Olivier, and R. van Heerden. “Detecting Manipulated Smartphone Data on Android and iOS Devices”. In: Information Security. 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers. Ed. by H. S. Venter, M. Loock, M. Coetzee, M. Eloff, and J. H. P. Eloff. Vol. 973. Communications in Computer and Information Science. Springer, 2019, pp. 89–103
2018
- Smartphone data evaluation model: Identifying authentic
smartphone data
Full text
Abstract
BibTeX entry
Publisher site
H. Pieterse, M. S. Olivier, and R. van Heerden. “Smartphone data evaluation model: Identifying authentic smartphone data”. In: Digital Investigation 24 (Feb. 2018), pp. 11–24 - NoSQL
databases: forensic attribution implications
Abstract
BibTeX entry
Publisher site
W. K. Hauger and M. S. Olivier. “NoSQL databases: forensic attribution implications”. In: SAIEE Africa Research Journal 109.2 (June 2018), pp. 119–132
2017
- Forensic attribution in NoSQL databases
Abstract
BibTeX entry
Publisher site
W. Hauger and M. S. Olivier. “Forensic attribution in NoSQL databases”. In: 2017 Information Security for South Africa (ISSA). Ed. by H. S. Venter, M Loock, M Coetzee, M. M. Eloff, and J. H. P. Eloff. IEEE, Aug. 2017, pp. 74–82 -
Establishing Findings in Digital Forensic Examinations
Abstract
BibTeX entry
Publisher site
O. Oyelami and M. S. Olivier. “Establishing Findings in Digital Forensic Examinations”. In: Advances in Digital Forensics XIII. Ed. by G. Peterson and S. Shenoi. Springer, 2017, pp. 3–21 - Evaluating the Authenticity
of Smartphone Evidence
Abstract
BibTeX entry
Publisher site
H. Pieterse, M. S. Olivier, and R. van Heerden. “Evaluating the Authenticity of Smartphone Evidence”. In: Advances in Digital Forensics XIII. Ed. by G. Peterson and S. Shenoi. Springer, 2017, pp. 41–61
2016
- Digital forensic science: A manifesto
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Digital forensic science: A manifesto”. In: South African Computer Journal 28.2 (2016). Editorial, pp. 46–49 -
On the Morality of Teaching Students IT Crime Skills
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “On the Morality of Teaching Students IT Crime Skills”. In: ICT Education. 45th Annual Conference of the Southern African Computer Lecturers’ Association (SACLA 2016), Cullinan, South Africa, July 5–6, 2016, Revised Selected Papers. Ed. by S. Gruner. Invited keynote lecture. 2016, pp. 3–21 - The design of smartphone evidence awareness (SEAWARE)
training
Abstract
BibTeX entry
Publisher site
I. Z. Dlamini, M. S. Olivier, and M. Grobler. “The design of smartphone evidence awareness (SEAWARE) training”. In: Issues in Information Systems 2 (2016), pp. 170–182 - The smartphone evidence
awareness framework for the users
Abstract
BibTeX entry
I. Z. Dlamini, M. S. Olivier, and M. Grobler. “The smartphone evidence awareness framework for the users”. In: Proceedings of the 11th International Conference on Cyber Warfare and Security (ICCWS 2016). Ed. by T. Zlateva and V. Greiman. Mar. 2016 -
Reference Architecture for Android Applications to Support the Detection of
Manipulated Evidence
Abstract
BibTeX entry
Publisher site
Publisher site
H. Pieterse, M. S. Olivier, and R. van Heerden. “Reference Architecture for Android Applications to Support the Detection of Manipulated Evidence”. In: SAIEE Africa Research Journal (June 2016), pp. 106–117 - On the Need for Social Contract Theory in
the Ethics of Digital Forensics
Abstract
BibTeX entry
M. S. Olivier. “On the Need for Social Contract Theory in the Ethics of Digital Forensics”. In: AAFS 68th Annual Scientific Meeting. (Oral presentation; abstract included in proceedings). Las Vegas, Nevada, USA, Feb. 2016 - On a scientific theory of digital
forensics
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “On a scientific theory of digital forensics”. In: Advances in Digital Forensics XII. Ed. by G. Peterson and S. Shenoi. Springer, 2016, pp. 3–24
2015
- “Die siel van die mier”:
Reflections on the battle for ‘scholarly’ intelligence
Abstract
BibTeX entry
Publisher site
Publisher site
M. S. Olivier. ““Die siel van die mier”: Reflections on the battle for ‘scholarly’ intelligence”. In: TD The Journal for Transdisciplinary Research in Southern Africa 11.2 (2015), p. 12. doi: 10.4102/td.v11i2.77 - Towards a digital forensic
science
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Towards a digital forensic science”. In: Information Security for South Africa (ISSA). Ed. by H. S. Venter, M Loock, M Coetzee, M. M. Eloff, and S Flowerday. IEEE, Aug. 2015 -
Playing Hide-and-Seek: Detecting the Manipulation of Android Timestamps
Abstract
BibTeX entry
Publisher site
H. Pieterse, M. S. Olivier, and R. van Heerden. “Playing Hide-and-Seek: Detecting the Manipulation of Android Timestamps”. In: Information Security for South Africa (ISSA). Ed. by H. S. Venter, M Loock, M Coetzee, M. M. Eloff, and S Flowerday. IEEE, Aug. 2015 - The state of Database
Forensic research
Abstract
BibTeX entry
Publisher site
W. Hauger and M. S. Olivier. “The state of Database Forensic research”. In: Information Security for South Africa (ISSA). Ed. by H. S. Venter, M Loock, M Coetzee, M. M. Eloff, and S Flowerday. IEEE, Aug. 2015 - Beacons and their uses for digital forensics
purposes
Abstract
BibTeX entry
Publisher site
L. L. Lubbe and M. S. Olivier. “Beacons and their uses for digital forensics purposes”. In: 2015 Information Security for South Africa (ISSA). 2015, pp. 1–6 - The Impact of Triggers on Forensic
Acquisition and Analysis of Databases
Abstract
BibTeX entry
Publisher site
W. K. Hauger and M. S. Olivier. “The Impact of Triggers on Forensic Acquisition and Analysis of Databases”. In: SAIEE Africa Research Journal 106.2 (2015), pp. 64–73 -
Ideal Log Setting For Database Forensics Reconstruction
Abstract
BibTeX entry
Publisher site
O. M. Adedayo and M. S. Olivier. “Ideal Log Setting For Database Forensics Reconstruction”. In: Digital Investigation 12 (2015), pp. 27–40 -
Modelling Digital Autopsies on Medical Autopsies
Abstract
BibTeX entry
M. S. Olivier. “Modelling Digital Autopsies on Medical Autopsies”. In: American Academy of Forensic Sciences 67th Annual Scientific Meeting. Orlando, FL, USA, 2015 -
Notions of “Hypothesis” in Digital Forensics
Abstract
BibTeX entry
Publisher site
S. Tewelde, M. S. Olivier, and S. Gruner. “Notions of “Hypothesis” in Digital Forensics”. In: Advances in Digital Forensics XI. Ed. by G. Peterson and S. Shenoi. Vol. 462. IFIP Advances in Information and Communication Technology. Springer, 2015, pp. 29–43 - Determining Trigger Involvement During Forensic
Attribution in Databases
Abstract
BibTeX entry
Publisher site
W. Hauger and M. S. Olivier. “Determining Trigger Involvement During Forensic Attribution in Databases”. In: Advances in Digital Forensics XI. Ed. by G. Peterson and S. Shenoi. Vol. 462. IFIP Advances in Information and Communication Technology. Springer, 2015, pp. 163–177 - Using Yin’s Approach to Case Studies as a
Paradigm for Conducting Examinations
Abstract
BibTeX entry
Publisher site
O. Oyelami and M. S. Olivier. “Using Yin’s Approach to Case Studies as a Paradigm for Conducting Examinations”. In: Advances in Digital Forensics XI. Ed. by G. Peterson and S. Shenoi. Vol. 462. IFIP Advances in Information and Communication Technology. Springer, 2015, pp. 45–59
2014
- Database Forensics
BibTeX entry
M. S. Olivier. “Database Forensics”. In: Official (ISC)2® Guide to the CCFP CBK. Ed. by P. Stephenson. CRC, 2014, pp. 683–706 - Malware Forensics
BibTeX entry
M. S. Olivier. “Malware Forensics”. In: Official (ISC)2® Guide to the CCFP CBK. Ed. by P. Stephenson. CRC, 2014, pp. 707–737 - A Near-Miss Management
System to Facilitate Forensic Investigation of Software Failures
Full text
Abstract
BibTeX entry
M. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “A Near-Miss Management System to Facilitate Forensic Investigation of Software Failures”. In: Proceedings of the 13th European Conference on Cyber Warfare and Security. Ed. by A. Liaropoulos and G. Tsihrintzis. Academic Conferences, 2014, pp. 233–241 - The role of triggers in database forensics
Full text
Abstract
BibTeX entry
Publisher site
W. K. Hauger and M. S. Olivier. “The role of triggers in database forensics”. In: Information Security South Africa 2014 (ISSA 2014). Johannesburg, South Africa, Aug. 2014 - Database Application Schema
Forensics
Abstract
BibTeX entry
Publisher site
H. Beyers, M. S. Olivier, and G. P. Hancke. “Database Application Schema Forensics”. In: South African Computer Journal 55 (2014) - Bluetooth Command and Control channel
Abstract
BibTeX entry
Publisher site
H. Pieterse and M. S. Olivier. “Bluetooth Command and Control channel”. In: Computers & Security 45 (2014), pp. 75–83 - Combining fundamentals,
traditions, practice, and science in a digital forensics course
Full text
Abstract
BibTeX entry
M. S. Olivier. “Combining fundamentals, traditions, practice, and science in a digital forensics course”. In: South African Computer Lecturers’ Association Conference 2014 (SACLA 2014). Port Elizabeth, South Africa, June 2014 -
Catching the bug: pupils and punched cards in South Africa in the late
1970s
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Catching the bug: pupils and punched cards in South Africa in the late 1970s”. In: Reflections on the History of Computers in Education — Early Use of Computers and Teaching about Computing in Schools. Ed. by A. Tatnall and B. Davey. Vol. 424. IFIP Advances in Information and Communication Technology. Springer, 2014, pp. 291–301 - Querying Different Configurations Simultaneously to
Conduct Database Forensic Examinations
Full text
Abstract
BibTeX entry
M. S. Olivier. “Querying Different Configurations Simultaneously to Conduct Database Forensic Examinations”. In: AAFS 66th Annual Scientific Meeting. Seattle, WA, USA, 2014 -
Smartphones as Distributed Witnesses for Digital Forensics
Abstract
BibTeX entry
Publisher site
H. Pieterse and M. S. Olivier. “Smartphones as Distributed Witnesses for Digital Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson and S. Shenoi. Springer, 2014, pp. 237–251 - Schema Reconstruction in Database
Forensics
Full text
Abstract
BibTeX entry
Publisher site
O. M. Adedayo and M. S. Olivier. “Schema Reconstruction in Database Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson and S. Shenoi. Springer, 2014, pp. 101–116
2013
- Security Steps for
Smartphone Users
Full text
Abstract
BibTeX entry
Publisher site
H. Pieterse and M. S. Olivier. “Security Steps for Smartphone Users”. In: Information Security South Africa — 13th Annual Conference (ISSA 2013). Johannesburg, South Africa: IEEE, Aug. 2013 - On Complex Crimes and Digital Forensics
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “On Complex Crimes and Digital Forensics”. In: Information Security in Diverse Computing Environments. Ed. by A. V. D. M. Kayem and C. Meinel. IGI, 2014, pp. 230–244 - On the Scientific Maturity of Digital
Forensics Research
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier and S. Gruner. “On the Scientific Maturity of Digital Forensics Research”. In: Advances in Digital Forensics IX. Ed. by G. Peterson and S. Shenoi. IFIP Advances in Information and Communication Technology — Advances in Digital Forensics. Springer, 2013, pp. 33–49 - Design of a hybrid command and control mobile
botnet
Full text
Abstract
BibTeX entry
Publisher site
H Pieterse and M. S. Olivier. “Design of a hybrid command and control mobile botnet”. In: Journal of Information Warfare 12.1 (2013). (Journal version of Pieterse and Olivier, “Design of a Hybrid Command and Control Mobile Botnet”), pp. 70–82 - A Taxonomy of
Web Service Attacks
Abstract
BibTeX entry
Publisher site
K. F. P. Chan, M. S. Olivier, and R. P. van Heerden. “A Taxonomy of Web Service Attacks”. In: Proceedings of ICIW 2013 — The 8th International Conference on Information Warfare and Security. Ed. by D. Hart. Denver, Colorado, USA: Academic Conferences and Publishing, Mar. 2013, pp. 34–42 - On the completeness of reconstructed data for
database forensics
Abstract
BibTeX entry
Publisher site
O. M. Adedayo and M. S. Olivier. “On the completeness of reconstructed data for database forensics”. In: Digital Forensics and Cyber Crime. Ed. by M. Rogers and K. C. Seigfried-Spellar. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 114. Springer, 2013, pp. 220–238
2012
- Using
Time-Driven Activity-Based Costing to Manage Digital Forensic Readiness in Large
Organisations
Abstract
BibTeX entry
Publisher site
K. Reddy, H. S. Venter, and M. S. Olivier. “Using Time-Driven Activity-Based Costing to Manage Digital Forensic Readiness in Large Organisations”. In: Information Systems Frontiers 14.5 (2012), pp. 1061–1077 -
‘Have you no remembrance of anything remarkable as you came up the hill?’ —
The challenge of network forensics
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “‘Have you no remembrance of anything remarkable as you came up the hill?’ — The challenge of network forensics”. In: The 2012 International Network Conference (INC 2012). Invited keynote address. Port Elizabeth, South Africa: iTunes University, July 2012 - Improving system availability with near-miss
analysis
Abstract
BibTeX entry
Publisher site
M. A. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “Improving system availability with near-miss analysis”. In: Network Security (Oct. 2012), pp. 18–20 - Gamifying Authentication
Full text
Abstract
BibTeX entry
Publisher site
C. J. Kroeze and M. S. Olivier. “Gamifying Authentication”. In: Information Security for South Africa (ISSA), 2012. IEEE, Aug. 2012, pp. 1–8 - Cloud
Separation: Stuck inside the cloud
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Delport and M. S. Olivier. “Cloud Separation: Stuck inside the cloud”. In: Trust, Privacy and Security in Digital Business — 9th International conference, TrustBus, 2012 Vienna, Austria, September 2012, Proceedings. Ed. by S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr. LNCS 7449. Springer, 2012, pp. 36–49 -
Database forensics
Full text
BibTeX entry
O. M. Fasan and M. S. Olivier. “Database forensics”. In: Proceedings of the NCS ReCITI. Akwa Ibom, Nigeria, July 2012 -
Android botnets on the rise: Trends and characteristics
Full text
BibTeX entry
Publisher site
H. Pieterse and M. S. Olivier. “Android botnets on the rise: Trends and characteristics”. In: Information Security for South Africa (ISSA), 2012. IEEE, 2012, pp. 1–5 - Correctness proof for database reconstruction algorithm
Abstract
BibTeX entry
Publisher site
O. M. Fasan and M. S. Olivier. “Correctness proof for database reconstruction algorithm”. In: Digital Investigation 9.2 (2012), pp. 138–150 - On
Dimensions of Reconstruction in Database Forensics
Abstract
BibTeX entry
O. M. Fasan and M. S. Olivier. “On Dimensions of Reconstruction in Database Forensics”. In: Seventh International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA). Hersonissos, Crete, Greece, June 2012, pp. 97–106 -
Arguments and Methods for Database Data Model Forensics
Abstract
BibTeX entry
H. Q. Beyers, M. S. Olivier, and G. P. Hancke. “Arguments and Methods for Database Data Model Forensics”. In: Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA). Hersonissos, Crete, Greece, June 2012, pp. 139–149 - Isolating instances in the cloud
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Delport and M. S. Olivier. “Isolating instances in the cloud”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi. Springer, 2012, pp. 187–200 - Reconstruction in Database Forensics
Full text
Abstract
BibTeX entry
Publisher site
O. M. Fasan and M. S. Olivier. “Reconstruction in Database Forensics”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi. Springer, 2012, pp. 273–287 - Using Internal Depth to Aid
Stereoscopic Image Splicing Detection
Abstract
BibTeX entry
Publisher site
M.-A. Fouché and M. S. Olivier. “Using Internal Depth to Aid Stereoscopic Image Splicing Detection”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi. Springer, 2012, pp. 319–333 - Data Hiding Techniques for Database
Environments
Abstract
BibTeX entry
Publisher site
H. Pieterse and M. S. Olivier. “Data Hiding Techniques for Database Environments”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi. Springer, 2012, pp. 289–301 - Finding
File Fragments in the Cloud
Abstract
BibTeX entry
Publisher site
D. Ras and M. S. Olivier. “Finding File Fragments in the Cloud”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi. Springer, 2012, pp. 169–185
2011
-
Detecting non-stereoscopic to stereoscopic image splicing with the use of
disparity maps
Abstract
BibTeX entry
Publisher site
M.-A. Fouché and M. S. Olivier. “Detecting non-stereoscopic to stereoscopic image splicing with the use of disparity maps”. In: Proceedings of the South African Institute of Computer Scientists and Information Technologists Conference on Knowledge, Innovation and Leadership in a Diverse, Multidisciplinary Environment. SAICSIT ’11. Cape Town, South Africa: ACM, 2011, pp. 271–274. isbn: 978-1-4503-0878-6 -
Proposing a Digital Operational Forensic Investigation Process
Full text
Abstract
BibTeX entry
M. A. Bihina Bella, M. S. Olivier, and J. H. P. Eloff. “Proposing a Digital Operational Forensic Investigation Process”. In: Proceedings of the sixth International Workshop on Digital Forensics & Incident Analysis. Ed. by N. Clarke and T. Tryfonas. London, UK, July 2011, pp. 17–32 - Detecting Non-Stereoscopic to
Stereoscopic Image Splicing with the use of Disparity Maps
Abstract
BibTeX entry
Publisher site
M.-A. Fouché and M. S. Olivier. “Detecting Non-Stereoscopic to Stereoscopic Image Splicing with the use of Disparity Maps”. In: Proceedings of the SAICSIT Annual Research Conference 2011. (Short paper). Cape Town, South Africa, Oct. 2011, pp. 271–274 - Analysing the fairness of trust-based Mobile Ad
Hoc Network protocols
Full text
Abstract
BibTeX entry
I. D. Burke and M. S. Olivier. “Analysing the fairness of trust-based Mobile Ad Hoc Network protocols”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Published electronically). Johannesburg, South Africa, Aug. 2011 - Network Forensics in a
Clean-slate Internet Architecture
Full text
Abstract
BibTeX entry
T. Strauss and M. S. Olivier. “Network Forensics in a Clean-slate Internet Architecture”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Published electronically). Aug. 2011 -
Nature and Forensic Investigation of Crime in Second Life
Full text
Abstract
BibTeX entry
A. S. Rakitianskaia, M. S. Olivier, and A. K. Cooper. “Nature and Forensic Investigation of Crime in Second Life”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper; published electronically). Johannesburg, South Africa, Aug. 2011 - An Approach to Examine the
Metadata and Data of a Database Management System by making use of
a Forensic Comparison Tool
Abstract
BibTeX entry
H. Beyers, M. S. Olivier, and G. P. Hancke. “An Approach to Examine the Metadata and Data of a Database Management System by making use of a Forensic Comparison Tool”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper; published electronically). Johannesburg, South Africa, Aug. 2011 -
Isolating a Cloud Instance for a Digital Forensic Investigation
Full text
Abstract
BibTeX entry
W. Delport, M. S. Olivier, and M. D. Köhn. “Isolating a Cloud Instance for a Digital Forensic Investigation”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper; published electronically). Johannesburg, South Africa, Aug. 2011 - On Compound Purposes and
Compound Reasons for Enabling Privacy
Abstract
BibTeX entry
Publisher site
W. J. C. van Staden and M. S. Olivier. “On Compound Purposes and Compound Reasons for Enabling Privacy”. In: Journal of Universal Computer Science 17.3 (2011), pp. 426–450 - Using e-coins to ensure fair sharing of donor funds amongst HIV
healthcare facilities
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier, J. H. P. Eloff, H. S. Venter, and M. E. Botes. “Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities”. In: South African Computer Journal (2011), pp. 47–57 - Location Privacy: privacy, efficiency and recourse
through a prohibitive contract
Abstract
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “Location Privacy: privacy, efficiency and recourse through a prohibitive contract”. In: Transactions on Data Privacy 4.1 (2011), pp. 19–30 - SWF
Steganography: Techniques for Hiding Data in SWF Files
Abstract
BibTeX entry
Publisher site
M.-A. Fouche and M. S. Olivier. “SWF Steganography: Techniques for Hiding Data in SWF Files”. In: Advances in Digital Forensics VII. Ed. by G. Peterson and S. Shenoi. Springer, 2011, pp. 245–255 - Assembling the
Metadata for a Database Forensic Examination
Abstract
BibTeX entry
Publisher site
H. Beyers, M. S. Olivier, and G. P. Hancke. “Assembling the Metadata for a Database Forensic Examination”. In: Advances in Digital Forensics VII. Ed. by G. Peterson and S. Shenoi. Springer, 2011, pp. 89–99
2010
- Sequenced release of privacy-accurate
information in a forensic investigation
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “Sequenced release of privacy-accurate information in a forensic investigation”. In: Digital Investigation 7.1–2 (2010), pp. 95–101 - A Generalized model
for understanding and education of Information and Computer Security
Full text
Abstract
BibTeX entry
H. Visage and M. S. Olivier. “A Generalized model for understanding and education of Information and Computer Security”. In: Proceedings of the ISSA 2010 Conference. Ed. by H. S. Venter, M. Coetzee, and L. Labuschagne. (Research in progress paper, published electronically). Johannesburg, South Africa, Aug. 2010 - In Search of Search Privacy
Abstract
BibTeX entry
Publisher site
W. Brandi and M. S. Olivier. “In Search of Search Privacy”. In: Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2010). Ed. by S. Katsikas, J. Lopez, and M. Soriano. Vol. 6264. Lecture Notes in Computer Science. 2010, pp. 102–116 -
Framework for Developing Realistic MANET Simulations
Abstract
BibTeX entry
I. Burke, S. Naidoo, and M. S. Olivier. “Framework for Developing Realistic MANET Simulations”. In: Proceedings of ICIW 2010 — The 5th International Conference on Information-Warfare & Security. Wright-Patterson Air Force Base, Ohio, USA, Apr. 2010, pp. 65–71 - On the use of economic price theory to find the
optimum levels of privacy and information utility in non-perturbative microdata
anonymisation
Abstract
BibTeX entry
Publisher site
M. P. Zielinski and M. S. Olivier. “On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation”. In: Data & Knowledge Engineering 69.5 (2010), pp. 399–423
2009
- Pattern-Based
Approach for Logical Traffic Isolation Forensic Modelling
Abstract
BibTeX entry
Publisher site
I. Z. Dlamini, M. S. Olivier, and S. Sibiya. “Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling”. In: Twentieth International Workshop on Database and Expert Systems Applications. Ed. by A. M. Tjoa and R. R. Wagner. IEEE Computer Society, 2009, pp. 145–149 - Emergency
Privacy Measures
Abstract
BibTeX entry
Publisher site
H. J. G. Oberholzer and M. S. Olivier. “Emergency Privacy Measures”. In: International Conference on Computational Science and Engineering, 2009 (CSE ’09). Vol. 3. IEEE, 2009, pp. 324–329 -
The design of a logical traffic isolation forensic model
Full text
Abstract
BibTeX entry
I. Z. Dlamini and M. S. Olivier. “The design of a logical traffic isolation forensic model”. In: Proceedings of the ISSA 2009 Conference. Ed. by H. S. Venter, M. Coetzee, and L. Labuschagne. (Research in progress paper, published electronically). Johannesburg, South Africa, July 2009 - How appropriate is
k-anonymity for addressing the conflict between privacy and information utility in
microdata anonymisation?
Full text
BibTeX entry
M. P. Zielinski and M. S. Olivier. “How appropriate is k-anonymity for addressing the conflict between privacy and information utility in microdata anonymisation?” In: Proceedings of the ISSA 2009 Conference. Ed. by H. S. Venter, M. Coetzee, and L. Labuschagne. (Published electronically). Johannesburg, South Africa, July 2009 - A Simulation of
Logical Traffic Isolation Using Differentiated Services
BibTeX entry
I. Z. Dlamini, M. S. Olivier, and M. Grobler. “A Simulation of Logical Traffic Isolation Using Differentiated Services”. In: Proceedings of the 4th International Workshop on Digital Forensics & Incident Analysis, WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information Security & Network Research, University of Plymouth, 2009, pp. 20–27 - Processing Algorithms for Components within a
Forensic Evidence Management System
Abstract
BibTeX entry
Publisher site
K. K. Arthur and M. S. Olivier. “Processing Algorithms for Components within a Forensic Evidence Management System”. In: Proceedings of the 4th International Workshop on Digital Forensics & Incident Analysis, WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information Security & Network Research, University of Plymouth, 2009, pp. 53–62 - XBRL-Trail: A model for
introducing digital forensic readiness to XBRL
Full text
Abstract
BibTeX entry
D. J. J. Kotze and M. S. Olivier. “XBRL-Trail: A model for introducing digital forensic readiness to XBRL”. In: Proceedings of the 4th International Workshop on Digital Forensics & Incident Analysis, WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information Security & Network Research, University of Plymouth, 2009, pp. 93–104 - A fraud management system architecture for
next-generation networks
Abstract
BibTeX entry
Publisher site
M. A. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “A fraud management system architecture for next-generation networks”. In: Forensic Science International 185.1-3 (2009), pp. 51–58 -
Information Technology Research — A Practical Guide for Computer Science and
Informatics
Abstract
BibTeX entry
Publisher site
M. S. Olivier. Information Technology Research — A Practical Guide for Computer Science and Informatics. 3rd. Pretoria, South Africa: Van Schaik, 2009. isbn: 978-0-627-02758-1 - On Metadata
Context in Database Forensics
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “On Metadata Context in Database Forensics”. In: Digital Investigation 5.3–4 (2009), pp. 115–123
2008
- On the Probability of a False Positive Match
for Digital Camera Identification based on Sensor Dirt Location
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location”. In: South African Computer Journal 41 (2008), pp. 21–28 - A comparison of simulated
traffic conditioner performance
BibTeX entry
Publisher site
T. Strauss, D. G. Kourie, and M. S. Olivier. “A comparison of simulated traffic conditioner performance”. In: Computer Communications 31.17 (2008), pp. 3933–3940 - Towards a
model of responsibility for proactive systems
BibTeX entry
Publisher site
Publisher site
S. L. Venter, M. S. Olivier, and J. J. Britz. “Towards a model of responsibility for proactive systems”. In: Journal of Information Ethics 17.2 (2008), pp. 78–90 - Towards
Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer
Information Privacy
Abstract
BibTeX entry
Publisher site
K. Reddy, H. S. Venter, M. S. Olivier, and I. Currie. “Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy”. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust. Ed. by L. Korba, S. Marsh, and R. Safavi-Naini. IEEE, 2008, pp. 56–64 - Preservation of
Privacy in Thwarting the Ballot Stuffing Scheme
Abstract
BibTeX entry
Publisher site
W. Brandi, M. S. Olivier, and A. Zugenmaier. “Preservation of Privacy in Thwarting the Ballot Stuffing Scheme”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Furnell, S. K. Katsikas, and A. Lioy. Vol. 5185. LNCS. Springer, 2008, pp. 195–204 - The Use of File Timestamps in Digital Forensics
Full text
Abstract
BibTeX entry
R. Koen and M. S. Olivier. “The Use of File Timestamps in Digital Forensics”. In: Proceedings of the ISSA 2008 Innovative Minds Conference. Ed. by H. S. Venter, M. M. Eloff, J. H. P. Eloff, and L. Labuschagne. (Published electronically). Johannesburg, South Africa, July 2008 - UML
Modeling of Digital Forensic Process Models (DFPMs)
Full text
Abstract
BibTeX entry
M. D. Köhn, J. H. P. Eloff, and M. S. Olivier. “UML Modeling of Digital Forensic Process Models (DFPMs)”. In: Proceedings of the ISSA 2008 Innovative Minds Conference. Ed. by H. S. Venter, M. M. Eloff, J. H. P. Eloff, and L. Labuschagne. (Published electronically). Johannesburg, South Africa, July 2008 - Application
of Message Digests for the Verification of Logical Forensic Data
Full text
Abstract
BibTeX entry
P. M. Mokhonoana and M. S. Olivier. “Application of Message Digests for the Verification of Logical Forensic Data”. In: Proceedings of the ISSA 2008 Innovative Minds Conference. Ed. by H. S. Venter, M. M. Eloff, J. H. P. Eloff, and L. Labuschagne. (Published electronically). Johannesburg, South Africa, July 2008 - Considerations Towards a Cyber Crime Profiling
System
Abstract
BibTeX entry
Publisher site
K. K. Arthur, M. S. Olivier, H. S. Venter, and J. H. P. Eloff. “Considerations Towards a Cyber Crime Profiling System”. In: Proceedings of AReS 2008 — The Third International Conference on Availability, Security and Reliability. Ed. by S. Jakoubi, S. Tjoa, and E. R. Weippl. IEEE, 2008, pp. 1388–1393 - Using Sensor Dirt for Toolmark Analysis of Digital
Photographs
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Using Sensor Dirt for Toolmark Analysis of Digital Photographs”. In: Advances in Digital Forensics IV. Ed. by I. Ray and S. Shenoi. Springer, 2008, pp. 193–206 - A Live-System
Forensic Evidence Acquisition Tool
Full (protected)
Abstract
BibTeX entry
Publisher site
R. Koen and M. S. Olivier. “A Live-System Forensic Evidence Acquisition Tool”. In: Advances in Digital Forensics IV. Ed. by I. Ray and S. Shenoi. Springer, 2008, pp. 325–334 - Bridging the gap between anonymous e-mail and anonymous Web
browsing
Full text
Abstract
BibTeX entry
Publisher site
H. Tillwick and M. S. Olivier. “Bridging the gap between anonymous e-mail and anonymous Web browsing”. In: Online Information Review 32.1 (2008), pp. 22–34
2007
- SQL’s Revoke
with a View on Privacy
Full text
BibTeX entry
Publisher site
W. van Staden and M. S. Olivier. “SQL’s Revoke with a View on Privacy”. In: Proceedings of SAICSIT 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists. Ed. by L. Barnard and R. A. Botha. (Published electronically). Fish River, South Africa, Oct. 2007, pp. 181–188 - A
Silent SMS Denial of Service (DoS) Attack
Full text
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “A Silent SMS Denial of Service (DoS) Attack”. In: Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007) Proceedings. (Published Electronically). Sugar Beach Resort, Mauritius, Sept. 2007 - An Open-Source Forensics Platform
Full text
BibTeX entry
R. Koen and M. S. Olivier. “An Open-Source Forensics Platform”. In: Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007) Proceedings. (Published Electronically). Sugar Beach Resort, Mauritius, Sept. 2007 - Acquisition of a Symbian Smart phone’s Content with an
On-Phone Forensic Tool
Full text
BibTeX entry
P. M. Mokhonoana and M. S. Olivier. “Acquisition of a Symbian Smart phone’s Content with an On-Phone Forensic Tool”. In: Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007) Proceedings. (Published Electronically). Sugar Beach Resort, Mauritius, Sept. 2007 - Patlet for Digital Forensics First
Responders
Full (protected)
Abstract
BibTeX entry
Publisher site
D. Kotze and M. S. Olivier. “Patlet for Digital Forensics First Responders”. In: Proceedings: Eighteenth International Workshop on Database and Expert Systems Applications. Ed. by A. M. Tjoa and R. R. Wagner. IEEE, 2007, pp. 770–774 - Using Purpose Lattices to Facilitate
Customisation of Privacy Agreements
BibTeX entry
Publisher site
W. J. C. van Staden and M. S. Olivier. “Using Purpose Lattices to Facilitate Customisation of Privacy Agreements”. In: Trust, Privacy and Security in Digital Business. Ed. by C. Lambrinoudakis, G. Pernul, and A. M. Tjoa. Vol. 4657. LNCS. Springer, 2007, pp. 201–209 - Privaatheid en Komplekse Redes in ’n Databasis
BibTeX entry
W. J. C. van Staden and M. S. Olivier. “Privaatheid en Komplekse Redes in ’n Databasis”. In: Die Suid-Afrikaanse Tydskrif vir Natuurwetenskap en Tegnologie 26.2 (2007). (Slegs abstrak), p. 171 - Applying the Biba Integrity Model within a
Forensic Evidence Management System
Full (protected)
Abstract
BibTeX entry
Publisher site
K. K. Arthur, M. S. Olivier, and H. S. Venter. “Applying the Biba Integrity Model within a Forensic Evidence Management System”. In: Advances in Digital Forensics III. Ed. by P. Craiger and S. Shenoi. Springer, 2007, pp. 317–327 - Western
Privacy and/or Ubuntu? Some Critical Comments on the Influences in the
Forthcoming Data Privacy Bill in South Africa
BibTeX entry
Publisher site
H. N. Olinger, J. J. Britz, and M. S. Olivier. “Western Privacy and/or Ubuntu? Some Critical Comments on the Influences in the Forthcoming Data Privacy Bill in South Africa”. In: International Information and Library Review 39.1 (2007), pp. 31–43
2006
- Title: Exposing anonymous network participants
via an external attack
BibTeX entry
W. A. Brandi and M. S. Olivier. “Title: Exposing anonymous network participants via an external attack”. In: South African Computer Journal 37 (2006), pp. 12–18 - The use of self-organising
maps for anomalous behaviour detection in a digital investigation
BibTeX entry
Publisher site
B. K. L. Fei, J. H. P. Eloff, M. S. Olivier, and H. S. Venter. “The use of self-organising maps for anomalous behaviour detection in a digital investigation”. In: Forensic Science International 162.1–3 (2006), pp. 33–37 - Using
image steganography for decryptor distribution
BibTeX entry
Publisher site
T. Morkel, J. H. P. Eloff, and M. S. Olivier. “Using image steganography for decryptor distribution”. In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. Ed. by R. Meersman, Z. Tari, and P. Herrero. Vol. 4277. LNCS. Springer, 2006, pp. 322–330 - Extending P3P to Facilitate Proxies
which Pose as a Potential Threat to Privacy
BibTeX entry
Publisher site
W. A. Brandi and M. S. Olivier. “Extending P3P to Facilitate Proxies which Pose as a Potential Threat to Privacy”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 81–90 - Extending SQL to Allow the Active Usage of Purposes
BibTeX entry
Publisher site
W. J. C. van Staden and M. S. Olivier. “Extending SQL to Allow the Active Usage of Purposes”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 123–131 - Information leakage in
ubiquitous Voice-over-IP
Full text
BibTeX entry
Publisher site
T. Neumann, H. Tillwick, and M. S. Olivier. “Information leakage in ubiquitous Voice-over-IP”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 233–242 - Anonymous
Mobile Conference Calls
Full text
Abstract
BibTeX entry
N. J. Croft and M. S. Olivier. “Anonymous Mobile Conference Calls”. In: Southern African Telecommunication Networks and Applications Conference 2006 (SATNAC 2006) Proceedings. Ed. by D. Browne. Vol. 1. Stellenbosch, South Africa, Sept. 2006, pp. 411–416 - On
bidder zones, cell phones and ballot stuffing
Full text
Abstract
BibTeX entry
W. A. Brandi and M. S. Olivier. “On bidder zones, cell phones and ballot stuffing”. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference. Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Published electronically. Sandton, South Africa, July 2006 - Sequenced Release of Privacy
Accurate Call Data Record Information in a GSM Forensic Investigation
Full text
BibTeX entry
N. J. Croft and M. S. Olivier. “Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation”. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference. Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Published electronically. Sandton, South Africa, July 2006 - Framework for a Digital Forensic
Investigation
Full text
Abstract
BibTeX entry
M. Kohn, J. H. P. Eloff, and M. S. Olivier. “Framework for a Digital Forensic Investigation”. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference. Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Published electronically. Sandton, South Africa, July 2006 - Privacy contracts incorporated in a privacy protection framework
Full text
BibTeX entry
H. J. G. Oberholzer and M. S. Olivier. “Privacy contracts incorporated in a privacy protection framework”. In: Computer Systems Science and Engineering 21.1 (2006), pp. 5–16 - Advances in Digital Forensics II
Abstract
BibTeX entry
Publisher site
M. S. Olivier and S. Shenoi. Advances in Digital Forensics II. Vol. 222. IFIP. Springer, 2006 - Trust Based Forensics: Applying Machine Trust
Models to Forensic Investigation
Abstract
BibTeX entry
Publisher site
M. Wojcik, H. S. Venter, J. H. P. Eloff, and M. S. Olivier. “Trust Based Forensics: Applying Machine Trust Models to Forensic Investigation”. In: Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi. Springer, 2006, pp. 55–65 - Active Traffic Capture
for Network Forensics
Abstract
BibTeX entry
Publisher site
M. L. Slaviero, A. Granova, and M. S. Olivier. “Active Traffic Capture for Network Forensics”. In: Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi. Springer, 2006, pp. 215–228 - Differentiated Services for Logical Traffic Isolation
Abstract
BibTeX entry
Publisher site
T. Strauss, M. S. Olivier, and D. G. Kourie. “Differentiated Services for Logical Traffic Isolation”. In: Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi. Springer, 2006, pp. 229–237 - Network Forensics:
Web Proxy Log Analysis
Abstract
BibTeX entry
Publisher site
B. K. L. Fei, J. H. P. Eloff, M. S. Olivier, and H. S. Venter. “Network Forensics: Web Proxy Log Analysis”. In: Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi. Springer, 2006, pp. 247–258
2005
- Distributed Proxies for Browsing Privacy
— A Simulation of Flocks
Full text
Abstract
BibTeX entry
M. S. Olivier. “Distributed Proxies for Browsing Privacy — A Simulation of Flocks”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 104–112 - Towards a
framework for connection anonymity
Full text
Abstract
BibTeX entry
Publisher site
H. Tillwick and M. S. Olivier. “Towards a framework for connection anonymity”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 113–122 -
The Role of Key loggers in Computer-based Assessment Forensics
Full text
Abstract
BibTeX entry
Publisher site
R. Laubscher, M. S. Olivier, H. S. Venter, J. H. P. Eloff, and D. J. Rabe. “The Role of Key loggers in Computer-based Assessment Forensics”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 123–130 - A Simulation Study of Traffic Conditioner Performance
BibTeX entry
M. D. Strauss, D. G. Kourie, and M. S. Olivier. “A Simulation Study of Traffic Conditioner Performance”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 171–181 - Interactive to Proactive: Computer
Ethics in the Past and the Future
Full text
BibTeX entry
L. Venter, M. S. Olivier, and J. J. Britz. “Interactive to Proactive: Computer Ethics in the Past and the Future”. In: ETHICOMP 2005: Proceedings of the Eighth International Conference — Looking back to the future. Ed. by G. Collste, S. O. Hansson, S. Rogerson, and T. W. Bynum. Published electronically. Linköping, Sweden, Sept. 2005 - A fraud detection model for Next-Generation Networks
Full text
BibTeX entry
M. A. Bihina Bella, M. S. Olivier, and J. H. P. Eloff. “A fraud detection model for Next-Generation Networks”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 321–326 -
Using an approximated One-Time Pad to Secure Short Messaging Service
(SMS)
Full text
BibTeX entry
N. J. Croft and M. S. Olivier. “Using an approximated One-Time Pad to Secure Short Messaging Service (SMS)”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 71–76 - Detecting Uncooperative Ethernet
Elements using Accurate Round-trip Time Measurements
Full text
Abstract
BibTeX entry
J. P. Delport and M. S. Olivier. “Detecting Uncooperative Ethernet Elements using Accurate Round-trip Time Measurements”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 153–156 - Enhancements to SIP to prevent abuse of Voice-over-IP
services
Full text
Abstract
BibTeX entry
T. Neumann and M. S. Olivier. “Enhancements to SIP to prevent abuse of Voice-over-IP services”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 359–364 - Incorporating Prejudice into Trust Models to Reduce
Network Overload
Full text
BibTeX entry
M. Wojcik, H. S. Venter, J. H. P. Eloff, and M. S. Olivier. “Incorporating Prejudice into Trust Models to Reduce Network Overload”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 195–200 - Western Privacy
and Ubuntu — Influences in the Forthcoming Data Privacy Bill
Full text
BibTeX entry
H. N. Olinger, J. J. Britz, and M. S. Olivier. “Western Privacy and Ubuntu — Influences in the Forthcoming Data Privacy Bill”. In: Ethics of New Information Technology — Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005). Ed. by P. Brey, F. Grodzinsky, and L. Introna. Enschede, The Netherlands, July 2005, pp. 291–306 - Flocks: Distributed Proxies for Browsing Privacy
Full text
BibTeX entry
M. S. Olivier. “Flocks: Distributed Proxies for Browsing Privacy”. In: South African Computer Journal 34 (2005), pp. 33–40 - One-time Passwords in a
Mobile Environment using Steganography
BibTeX entry
T. Morkel, M. S. Olivier, J. H. P. Eloff, and H. S. Venter. “One-time Passwords in a Mobile Environment using Steganography”. In: Proceedings of the First International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2005). Ed. by P Georgiadis, S Gritzalis, and G. F. Marias. Diavlos Publications, July 2005, pp. 13–19 - Codec-Hopping: Secure and Private Voice
Communication in Bandwidth Constrained Networks
BibTeX entry
N. J. Croft, M. S. Olivier, and H. S. Venter. “Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks”. In: Proceedings of the First International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2005). Ed. by P Georgiadis, S Gritzalis, and G. F. Marias. Diavlos Publications, July 2005, pp. 85–91 - Polar: Proxies
Collaborating to Achieve Anonymous Web Browsing
BibTeX entry
H. Tillwick, T. Neumann, M. S. Olivier, H. S. Venter, and J. H. P. Eloff. “Polar: Proxies Collaborating to Achieve Anonymous Web Browsing”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 317–324 - Using
Compatible Keys in Achieving Subscriber Privacy Channelling for Billing in GSM
Networks
BibTeX entry
N. J. Croft and M. S. Olivier. “Using Compatible Keys in Achieving Subscriber Privacy Channelling for Billing in GSM Networks”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 245–252 - Balancing Patient Privacy and Treatment Facility
Accountability using a Centralised Pseudonymous HIV/AIDS Database
Abstract
BibTeX entry
H. S. Venter, M. S. Olivier, J. H. P. Eloff, and M. E. Botes. “Balancing Patient Privacy and Treatment Facility Accountability using a Centralised Pseudonymous HIV/AIDS Database”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 377–384 - Choosing A Deterministic
Function For Use With DAOMAP, the Distributed Allocation Of Multicast
Addresses Protocol
BibTeX entry
M. L. Slaviero and M. S. Olivier. “Choosing A Deterministic Function For Use With DAOMAP, the Distributed Allocation Of Multicast Addresses Protocol”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 105–112 - Attacking Signed Binaries
Full text
Abstract
BibTeX entry
M. L. Slaviero, J. Kroon, and M. S. Olivier. “Attacking Signed Binaries”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Published electronically. Sandton, South Africa, June 2005 - An Overview of Image Steganography
Full text
Abstract
BibTeX entry
T. Morkel, J. H. P. Eloff, and M. S. Olivier. “An Overview of Image Steganography”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Published electronically. Sandton, South Africa, June 2005 -
Purpose Organisation
Full text
Abstract
BibTeX entry
W. J. C. van Staden and M. S. Olivier. “Purpose Organisation”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 - Using Self-Organising Maps for
Anomalous Behaviour Detection in a Computer Forensic Investigation
Full text
Abstract
BibTeX entry
B. K. L. Fei, J. H. P. Eloff, M. S. Olivier, H. M. Tillwick, and H. S. Venter. “Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 - Using
the IPDR standard for NGN billing and fraud detection
Full text
Abstract
BibTeX entry
M. A. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “Using the IPDR standard for NGN billing and fraud detection”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. E. L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 - Computer
Forensics for a Computer-based Assessment: The Preparation Phase
Full text
Abstract
BibTeX entry
R. Laubscher, D. J. Rabe, M. S. Olivier, J. H. P. Eloff, and H. S. Venter. “Computer Forensics for a Computer-based Assessment: The Preparation Phase”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 - A Model for Spam Prevention in
Voice over IP Networks using Anonymous Verifying Authorities
Full text
BibTeX entry
N. J. Croft and M. S. Olivier. “A Model for Spam Prevention in Voice over IP Networks using Anonymous Verifying Authorities”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 -
Privacy Contracts as an Extension of Privacy Policies
Full text
BibTeX entry
Publisher site
H. J. G. Oberholzer and M. S. Olivier. “Privacy Contracts as an Extension of Privacy Policies”. In: Proceedings of the International Workshop on Privacy Data Management (PDM 2005). Tokyo, Japan, Apr. 2005, pp. 11–19 -
Forensics and Privacy-enhancing Technologies — Logging and Collecting
Evidence in Flocks
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Forensics and Privacy-enhancing Technologies — Logging and Collecting Evidence in Flocks”. In: Advances in Digital Forensics. Ed. by M. Pollitt and S. Shenoi. Springer, 2005, pp. 17–31 - Exploring Data generated by Computer Forensic Tools with
Self-Organizing Maps
Full (protected)
Abstract
BibTeX entry
Publisher site
B. K. L. Fei, J. H. P. Eloff, H. S. Venter, and M. S. Olivier. “Exploring Data generated by Computer Forensic Tools with Self-Organizing Maps”. In: Advances in Digital Forensics. Ed. by M. Pollitt and S. Shenoi. Springer, 2005, pp. 113–123 - Applying Forensic
Principles to Computer-Based Assessment
Full (protected)
Abstract
BibTeX entry
Publisher site
R. Laubscher, D. J. Rabe, M. S. Olivier, J. H. P. Eloff, and H. S. Venter. “Applying Forensic Principles to Computer-Based Assessment”. In: Advances in Digital Forensics. Ed. by M. Pollitt and S. Shenoi. Springer, 2005, pp. 105–112
2004
- Using
Organisational Safeguards to Make Justifiable Decisions when Processing Personal
Data
Full text
BibTeX entry
Publisher site
M. S. Olivier. “Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data”. In: South African Computer Journal 33 (2004), pp. 78–88 - PIDS: A Privacy Intrusion
Detection System
BibTeX entry
Publisher site
H. S. Venter, M. S. Olivier, and J. H. P. Eloff. “PIDS: A Privacy Intrusion Detection System”. In: Internet Research 14.5 (2004), pp. 360–365 - Flocks: Distributed Proxies for Browsing Privacy
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Flocks: Distributed Proxies for Browsing Privacy”. In: Proceedings of SAICSIT 2004 — fulfilling the promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo. Also published as a journal paper Olivier, “Flocks: Distributed Proxies for Browsing Privacy”. Stellenbosch, South Africa, Oct. 2004, pp. 79–88 - Towards a Hippocratic Log File
Architecture
Full text
Abstract
BibTeX entry
Publisher site
A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards a Hippocratic Log File Architecture”. In: Proceedings of SAICSIT 2004 — fulfilling the promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo. Stellenbosch, South Africa, Oct. 2004, pp. 186–193 - The use
of a Third Party Proxy in Achieving GSM Anonymity
Full text
Abstract
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “The use of a Third Party Proxy in Achieving GSM Anonymity”. In: Southern African Telecommunication Networks and Applications Conference 2004 (SATNAC 2004). Ed. by D. Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004 - DAOMAP: A
Distributed IPv6 Multicast Address Allocating Protocol
Full text
Abstract
BibTeX entry
M. Slaviero and M. S. Olivier. “DAOMAP: A Distributed IPv6 Multicast Address Allocating Protocol”. In: Southern African Telecommunication Networks and Applications Conference 2004 (SATNAC 2004). Ed. by D. Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004 - Privacy under Conditions of
Concurrent Interaction with Multiple Parties
Full (protected)
BibTeX entry
Publisher site
M. S. Olivier. “Privacy under Conditions of Concurrent Interaction with Multiple Parties”. In: Data and Applications Security XVII — Status and Prospects. Ed. by S. de Capitani di Vimercati, I. Ray, and I. Ray. Kluwer, 2004, pp. 105–118 - PIDS:
A Privacy Intrusion Detection System
Full text
BibTeX entry
H. S. Venter, M. S. Olivier, and J. H. P. Eloff. “PIDS: A Privacy Intrusion Detection System”. In: Proceedings of the Fourth International Network Conference. Ed. by S. M. Furnell and P. S. Dowland. Journal version also published Venter, Olivier, and Eloff, “PIDS: A Privacy Intrusion Detection System”. Plymouth, UK, July 2004, pp. 255–262 - Using a central data repository for biometric authentication in
passport systems
Full text
Abstract
BibTeX entry
M. Breedt and M. S. Olivier. “Using a central data repository for biometric authentication in passport systems”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - Towards
Hippocratic Log files
Full text
Abstract
BibTeX entry
A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards Hippocratic Log files”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - Design Issues: A Virtual Machine for
Security in a Relational Database Management System
Full text
Abstract
BibTeX entry
W. J. C. van Staden and M. S. Olivier. “Design Issues: A Virtual Machine for Security in a Relational Database Management System”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - On Privacy and the Web
Full text
Abstract
BibTeX entry
W. A. Brandi and M. S. Olivier. “On Privacy and the Web”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - A Layered Security Architecture: Design Issues
Full text
Abstract
BibTeX entry
H. Tillwick and M. S. Olivier. “A Layered Security Architecture: Design Issues”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Work in progress paper, published electronically. Midrand, South Africa, June 2004 - An approach to build a
fortified network logger that is resilient to cracking attempts
Full text
Abstract
BibTeX entry
J. Kroon and M. S. Olivier. “An approach to build a fortified network logger that is resilient to cracking attempts”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Work in progress paper, published electronically. Midrand, South Africa, June 2004 - Curtailing Web defacement using a read-only strategy
Full text
Abstract
BibTeX entry
A. Cooks and M. S. Olivier. “Curtailing Web defacement using a read-only strategy”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Work in progress paper, published electronically. Midrand, South Africa, June 2004 - Information Technology
Research — A Practical Guide for Computer Science and Informatics
Abstract
BibTeX entry
M. S. Olivier. Information Technology Research — A Practical Guide for Computer Science and Informatics. 2nd. Pretoria, South Africa: Van Schaik, 2004. isbn: 978-0-627-02576-1
2003
- A Layered Architecture for
Privacy-enhancing Technologies
Full text
BibTeX entry
M. S. Olivier. “A Layered Architecture for Privacy-enhancing Technologies”. In: South African Computer Journal 31 (2003), pp. 53–61 - Using Organisational Safeguards to Make Justifiable
Decisions when Processing Personal Data
Full text
BibTeX entry
M. S. Olivier. “Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data”. In: IT Research in Developing Countries (SAICSIT 2003). Ed. by J. H. P. Eloff, P. Kotzé, A. P. Engelbrecht, and M. M. Eloff. Journal version also published Olivier, “Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data”. Sandton, South Africa, Sept. 2003, pp. 275–284 - A Layered Architecture for Privacy-enhancing Technologies
Full text
BibTeX entry
M. S. Olivier. “A Layered Architecture for Privacy-enhancing Technologies”. In: Proceedings of the Third Annual Information Security South Africa Conference (ISSA2003). Ed. by J. H. P. Eloff, H. S. Venter, L. Labuschagne, and M. M. Eloff. Journal version also published Olivier, “A Layered Architecture for Privacy-enhancing Technologies”. Sandton, South Africa, July 2003, pp. 113–126 - Privacy and Civil Liberties
Full (protected)
BibTeX entry
Publisher site
D. Chadwick, M. S. Olivier, P. Samarati, E. Sharpston, and B. Thuraishingham. “Privacy and Civil Liberties”. In: Research Directions in Database and Application Security. Ed. by E. Gudes and S. Shenoi. Kluwer, 2003, pp. 331–346 - Implementing Workflow
with Microsoft’s Distributed Object Model (DCOM)
Full (protected)
Abstract
BibTeX entry
Publisher site
L. C. J. Dreyer and M. S. Olivier. “Implementing Workflow with Microsoft’s Distributed Object Model (DCOM)”. In: Research Directions in Database and Application Security. Ed. by E. Gudes and S. Shenoi. Kluwer, 2003, pp. 61–72 - WorkFlow Analyzed for Security and Privacy in using Databases
Full (protected)
BibTeX entry
Publisher site
W. Teepe, R. P. van de Riet, and M. S. Olivier. “WorkFlow Analyzed for Security and Privacy in using Databases”. In: Journal of Computer Security 11.3 (2003), pp. 353–364 - Database Privacy
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Database Privacy”. In: SigKDD Explorations 4.2 (2003), pp. 20–27
2002
- PrivGuard: A model to protect private information based on
its usage
Full text
BibTeX entry
F. A. Lategan and M. S. Olivier. “PrivGuard: A model to protect private information based on its usage”. In: South African Computer Journal 29 (2002), pp. 58–68 - Wrappers — a mechanism to
support state-based authorisation in Web applications
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier and E. Gudes. “Wrappers — a mechanism to support state-based authorisation in Web applications”. In: Data and Knowledge Engineering 43.3 (2002), pp. 281–292 - A Chinese Wall Approach to Privacy Policies
for The Web
Full (protected)
Abstract
BibTeX entry
Publisher site
F. A. Lategan and M. S. Olivier. “A Chinese Wall Approach to Privacy Policies for The Web”. In: 26th Annual International Computer Software and Applications Conference (COMPSAC 2002). Oxford, UK: IEEE, 2002, pp. 940–944 - The Delegation Authorization
Model: A Model for the Dynamic Delegation of Authorization Rights in
a Secure Workflow Management System
Full text
Abstract
BibTeX entry
K. Venter and M. S. Olivier. “The Delegation Authorization Model: A Model for the Dynamic Delegation of Authorization Rights in a Secure Workflow Management System”. In: ISSA2002. Published electronically. Muldersdrift, South Africa, 2002 -
Maintaining Integrity within Mobile Self Protecting Objects
Abstract
BibTeX entry
W. Brandi and M. S. Olivier. “Maintaining Integrity within Mobile Self Protecting Objects”. In: Informatica 26.2 (2002), pp. 117–122 - Database and
Application Security XV
Abstract
BibTeX entry
Publisher site
M. S. Olivier and D. L. Spooner, eds. Database and Application Security XV. Kluwer, 2002 - A Comparison Between
ConSA and Current Linux Security Implementations
Full (protected)
Abstract
BibTeX entry
Publisher site
A. Hardy and M. S. Olivier. “A Comparison Between ConSA and Current Linux Security Implementations”. In: Database and Application Security XV. Ed. by M. S. Olivier and D. L. Spooner. Kluwer, 2002, pp. 211–224
2001
- A
Configurable Security Architecture Prototype
Full (protected)
Abstract
BibTeX entry
Publisher site
A. Hardy and M. S. Olivier. “A Configurable Security Architecture Prototype”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari. Kluwer, 2001, pp. 51–62 - Wrappers
— a mechanism to support state-based authorisation in Web applications
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier and E. Gudes. “Wrappers — a mechanism to support state-based authorisation in Web applications”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari. Journal version also published Olivier and Gudes, “Wrappers — a mechanism to support state-based authorisation in Web applications”. Kluwer, 2001, pp. 149–160 - WorkFlow Analyzed for
Security and Privacy in using Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Teepe, R. P. van de Riet, and M. S. Olivier. “WorkFlow Analyzed for Security and Privacy in using Databases”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari. Also published as a journal paper Teepe, van de Riet, and Olivier, “WorkFlow Analyzed for Security and Privacy in using Databases”. Kluwer, 2001, pp. 271–282 - Towards a Configurable Security Architecture
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Towards a Configurable Security Architecture”. In: Data and Knowledge Engineering 38.2 (2001), pp. 121–145 - Consumer Perception of
Electronic-commerce
Full text
Abstract
BibTeX entry
A. Martins, N. Martins, and M. S. Olivier. “Consumer Perception of Electronic-commerce”. In: South African Computer Journal 27 (2001), pp. 27–33 - Maintaining Integrity within Mobile Self
Protecting Objects
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Brandi and M. S. Olivier. “Maintaining Integrity within Mobile Self Protecting Objects”. In: Advances in Information Security Management & Small Systems Security. IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security. Ed. by J. H. P. Eloff, L. Labuschagne, R. von Solms, and G. Dhillon. Journal version also published Brandi and Olivier, “Maintaining Integrity within Mobile Self Protecting Objects”. Kluwer, 2001, pp. 45–55 - On granting
limited access to private information
Full text
Abstract
BibTeX entry
Publisher site
F. A. Lategan and M. S. Olivier. “On granting limited access to private information”. In: Proceedings of the Tenth International World Wide Web Conference. ACM, 2001, pp. 21–25
2000
- A comparison of two architectures for implementing
Security and Privacy in Cyberspace
Abstract
BibTeX entry
Publisher site
R. P. van de Riet, W. Janssen, M. S. Olivier, and R. Serban. “A comparison of two architectures for implementing Security and Privacy in Cyberspace”. In: Database and Expert Systems Applications. DEXA 2000. Ed. by M. Ibrahim, J. Küng, and N. Revell. Vol. 1873. Lecture Notes in Computer Science. Springer, 2000, pp. 287–301 - Enforcing privacy by withholding private information
Full (protected)
Abstract
BibTeX entry
Publisher site
F. A. Lategan and M. S. Olivier. “Enforcing privacy by withholding private information”. In: Information Security for Global Information Infrastructures. Ed. by S Qing and J. H. P. Eloff. Kluwer, 2000, pp. 421–430 - A
Research Methods Course in IT
Full text
BibTeX entry
M. S. Olivier. “A Research Methods Course in IT”. In: Proceedings of the SACLA 2000 Conference. Unrefereed. Strand, South Africa, June 2000, pp. 207–212
1999
- Modelling,
Specifying and Implementing Workflow Security in Cyberspace
Full (protected)
Abstract
BibTeX entry
Publisher site
E. Gudes, M. S. Olivier, and R. P. van de Riet. “Modelling, Specifying and Implementing Workflow Security in Cyberspace”. In: Journal of Computer Security 7.4 (1999), pp. 287–315 - Security and Privacy Issues for the
World Wide Web: Panel Discussion
Full (protected)
Abstract
BibTeX entry
Publisher site
B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson, and M. S. Olivier. “Security and Privacy Issues for the World Wide Web: Panel Discussion”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 269–284 -
Security Policies in Replicated and Autonomous Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
E. Gudes and M. S. Olivier. “Security Policies in Replicated and Autonomous Databases”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 93–107 - An Information-Flow Model for Privacy
(InfoPriv)
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
L. C. J. Dreyer and M. S. Olivier. “An Information-Flow Model for Privacy (InfoPriv)”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 77–90 -
Information Technology Research — A Practical Guide
Abstract
BibTeX entry
M. S. Olivier. Information Technology Research — A Practical Guide. Published by author, updated by Olivier, Information Technology Research — A Practical Guide for Computer Science and Informatics. Self-published, 1999
1998
- Specifying
Application-level Security in Workflow Systems
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier, R. P. van de Riet, and E. Gudes. “Specifying Application-level Security in Workflow Systems”. In: Proceedings of the Ninth International Workshop on Security of Data Intensive Applications (DEXA 98). Ed. by R Wagner. IEEE, 1998, pp. 346–351 - Dynamic Aspects of the InfoPriv Model for Information Privacy
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
L. C. J. Dreyer and M. S. Olivier. “Dynamic Aspects of the InfoPriv Model for Information Privacy”. In: Proceedings of the Ninth International Workshop on Security of Data Intensive Applications (DEXA 98). Ed. by R Wagner. IEEE, 1998, pp. 340–345 - A Workbench for
Privacy Policies
Full text
Full (protected)
BibTeX entry
Publisher site
L. C. J. Dreyer and M. S. Olivier. “A Workbench for Privacy Policies”. In: Twenty-Second Annual International Computer Software and Applications Conference. Vienna, Austria, Aug. 1998 - A Study of Small Business Computerisation in the South African
Context
Full (protected)
BibTeX entry
C. W. Rensleigh and M. S. Olivier. “A Study of Small Business Computerisation in the South African Context”. In: Proceedings of the AoM/IAoM 16th Annual Conference, Computer Science — IS/IT, Section 2. Ed. by S. Y. Shin and K Akingbehin. Chicago, Illinois, USA, Aug. 1998, pp. 23–28 - A Cost-effective, Low-risk Model for Consultant
Engagement in Small-business Computerisation
Full text
BibTeX entry
C. W. Rensleigh and M. S. Olivier. “A Cost-effective, Low-risk Model for Consultant Engagement in Small-business Computerisation”. In: SAAA Conference. Johannesburg, South Africa, July 1998 - An implementation of the Chinese Wall security
model using ConSA
Full text
Abstract
BibTeX entry
F. A. Lategan and M. S. Olivier. An implementation of the Chinese Wall security model using ConSA. Internal Report. Unpublished. Johannesburg, South Africa: Department of Computer Science, Rand Afrikaans University, 1998 - Alter-egos and Roles — Supporting Workflow
Security in Cyberspace
Full (protected)
Abstract
BibTeX entry
Publisher site
E. Gudes, R. P. van de Riet, H. F. M. Burg, and M. S. Olivier. “Alter-egos and Roles — Supporting Workflow Security in Cyberspace”. In: Database Security XI: Status and Prospects. Ed. by T. Y. Lin and S. Qian. Chapman & Hall, 1998, pp. 182–195
1997
- A
Computerised Consultation Service for the Computerisation of the Very Small
Small-business Enterprise
BibTeX entry
C. W. Rensleigh and M. S. Olivier. “A Computerised Consultation Service for the Computerisation of the Very Small Small-business Enterprise”. In: South African Computer Journal 20 (1997), pp. 25–35 - Secure Mobile Nodes in Federated Databases
Full text
Abstract
BibTeX entry
M. S. Olivier. “Secure Mobile Nodes in Federated Databases”. In: South African Computer Journal 20 (1997), pp. 11–17 - Integrity Constraints in
Federated Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Integrity Constraints in Federated Databases”. In: Database Security X: Status and Prospects. Ed. by P. Samarati and R. S. Sandhu. Chapman & Hall, 1997, pp. 43–57
1996
- Using Workflow to Enhance Security in Federated Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Using Workflow to Enhance Security in Federated Databases”. In: Communications and Multimedia Security II. Ed. by P Horster. Chapman & Hall, 1996, pp. 60–71 - Increasing Firewall
Reliability by Recording Routes
Full (protected)
Abstract
BibTeX entry
Publisher site
P. M. Boshoff and M. S. Olivier. “Increasing Firewall Reliability by Recording Routes”. In: Communications and Multimedia Security II. Ed. by P Horster. Chapman & Hall, 1996, pp. 303–314 - Supporting Site Security Policies for Members of
Federated Databases
Full (protected)
Abstract
BibTeX entry
M. S. Olivier. “Supporting Site Security Policies for Members of Federated Databases”. In: Proceedings of the Fourth European Conference on Information Systems. Ed. by J. D. Coelho, T Jelassi, W König, H Krcmar, R O’Callaghan, and M Saaksjarvi. Lisbon, Portugal, July 1996, pp. 45–56 - A Discretionary Security Model for Object-oriented
Environments
BibTeX entry
Publisher site
P. W. Jansen van Rensburg and M. S. Olivier. “A Discretionary Security Model for Object-oriented Environments”. In: Information Systems Security: Facing the Information Society of the 21st Century. Ed. by S. K. Katsikas and D. Gritzalis. Chapman & Hall, 1996, pp. 306–316 -
MoFAC: A Model for Fine-grained Access Control
Full (protected)
Abstract
BibTeX entry
Publisher site
J. S. von Solms, M. S. Olivier, and S. H. von Solms. “MoFAC: A Model for Fine-grained Access Control”. In: Information Systems Security: Facing the Information Society of the 21st Century. Ed. by S. K. Katsikas and D Gritzalis. Chapman & Hall, 1996, pp. 295–305 - A Prototype for Personal Business
Transactions on Public Networks
Full text
Abstract
BibTeX entry
E. J. Uphof and M. S. Olivier. “A Prototype for Personal Business Transactions on Public Networks”. In: Proceedings of the IFIP TC11 Workgroup 11.2 on Small System Security. Ed. by J. H. P. Eloff. Unrefereed. Samos, Greece, May 1996, pp. 13–27 -
Self-protecting Objects in a Secure Federated Database
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Self-protecting Objects in a Secure Federated Database”. In: Database Security IX: Status and Prospects. Ed. by D. L. Spooner, S. A. Demurjian, and J. E. Dobson. Chapman & Hall, 1996, pp. 27–42 - Self-protecting Objects in
Multipolicy Federated Databases: A Prototype
Full text
Abstract
BibTeX entry
M. S. Olivier. Self-protecting Objects in Multipolicy Federated Databases: A Prototype. Internal Report. Unpublished. Johannesburg, South Africa: Department of Computer Science, Rand Afrikaans University, 1996
1995
- A Heuristic
for Securing Hypertext Systems
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “A Heuristic for Securing Hypertext Systems”. In: Communications and Multimedia Security. Ed. by R Posch. Chapman & Hall, 1995, pp. 43–54 - A Multilevel
Secure Federated Database
Full (protected)
Abstract
BibTeX entry
M. S. Olivier. “A Multilevel Secure Federated Database”. In: Database Security VIII (A-60). Ed. by J. Biskup, M Morgenstern, and C. E. Landwehr. Elsevier Science, 1995, pp. 183–198 - Authorization in the Distributed Object Environment Model for
Fine-grained Access Control (MOFAC)
BibTeX entry
J. S. von Solms, M. S. Olivier, and S. H. von Solms. “Authorization in the Distributed Object Environment Model for Fine-grained Access Control (MOFAC)”. In: IT Sicherheit ’95. Poster. Graz, Austria, Sept. 1995 - Managing Information Security in a Client/Server
Environment with Distributed Object-oriented Role-based Security
BibTeX entry
J. van der Merwe, S. H. von Solms, and M. S. Olivier. “Managing Information Security in a Client/Server Environment with Distributed Object-oriented Role-based Security”. In: IT Sicherheit ’95. Poster. Graz, Austria, Sept. 1995
1994
- A Taxonomy for Secure Object-oriented Databases
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier and S. H. von Solms. “A Taxonomy for Secure Object-oriented Databases”. In: ACM Transactions on Database Systems 19.1 (1994), pp. 3–46 - MOSS II—A Model for Open System Security
BibTeX entry
P. W. J. van Zyl, M. S. Olivier, and S. H. von Solms. “MOSS II—A Model for Open System Security”. In: Proceedings of the IFIP TC11 Tenth Conference on Information Security, IFIP/SEC ’94. Curaçao, 1994
1993
- An Object-based
Version of the Path Context Model
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier and S. H. von Solms. “An Object-based Version of the Path Context Model”. In: International Journal of Computer Mathematics 49.3&4 (1993), pp. 133–144
1992
- Proceedings of the Seventh National Masters and PhD Computer
Science Students Conference
Abstract
BibTeX entry
M. S. Olivier, ed. Proceedings of the Seventh National Masters and PhD Computer Science Students Conference. Unrefereed. Rustenburg Kloof, South Africa, June 1992 - MOSS — A Model for
Open System Security
BibTeX entry
P. W. J. van Zyl, S. H. von Solms, and M. S. Olivier. “MOSS — A Model for Open System Security”. In: Proceedings of Uniforum Asia ’92. Singapore, 1992 - Building a Secure Database using
Self-protecting Objects
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier and S. H. von Solms. “Building a Secure Database using Self-protecting Objects”. In: Computers & Security 11.3 (1992), pp. 259–271 - DISCO: A Discretionary Security Model
for Object-oriented Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier and S. H. von Solms. “DISCO: A Discretionary Security Model for Object-oriented Databases”. In: IT Security: The Need for International Cooperation. Ed. by G. G. Gable and W. J. Caelli. Elsevier, 1992, pp. 345–357
1991
- Secure
Object-oriented Databases
BibTeX entry
M. S. Olivier. “Secure Object-oriented Databases”. PhD thesis. Johannesburg: Rand Afrikaans University, 1991 - Building A Secure Database using Self-protecting Objects
Abstract
BibTeX entry
M. S. Olivier and S. H. von Solms. “Building A Secure Database using Self-protecting Objects”. In: Proceedings of the Sixth South African Computer Symposium. Journal version also published Olivier and von Solms, “Building a Secure Database using Self-protecting Objects”. Caledon, South Africa, July 1991
1990
- Computer Viruses: A Management Perspective
BibTeX entry
M. S. Olivier. “Computer Viruses: A Management Perspective”. In: Proceedings of Infosec ’90 (Information Security Symposium). Pretoria, South Africa, Mar. 1990 - Computer Viruses: A Management Perspective
Full text
Abstract
BibTeX entry
M. S. Olivier. Computer Viruses: A Management Perspective. Technical Report PKOMP 90/4. Pretoria, South Africa: CSIR, Mar. 1990 - Rekenaarvirusse: ’n
Suid-Afrikaanse Perspektief
Full text
Abstract
BibTeX entry
M. S. Olivier. Rekenaarvirusse: ’n Suid-Afrikaanse Perspektief. Tegniese Verslag PKOMP 90/1. Pretoria, Suid-Afrika: WNNR, Jan. 1990
1989
- Rekenaarvirusse in Suid-Afrika
Full text
Abstract
BibTeX entry
M. S. Olivier. “Rekenaarvirusse in Suid-Afrika”. In: Vierde Jaarlikse Konferensie vir M.Sc en Ph.D Rekenaarwetenskapstudente. Onbeoordeeld. Cathedral Peak, Suid-Afrika, Sept. 1989 - Phigs on the B408/B409
BibTeX entry
M. S. Olivier. “Phigs on the B408/B409”. In: Concurrent Computing 89. Unrefereed. Pretoria, South Africa, Sept. 1989 - Analysis of the Bouncing Ball
Virus
Full text
Abstract
BibTeX entry
M. S. Olivier and H. W. Teitge. Analysis of the Bouncing Ball Virus. Technical Report PKOMP 89/5. Pretoria, South Africa: CSIR, July 1989 - Hoofstuk 16: Rekenaarvirusse
BibTeX entry
M. S. Olivier. “Hoofstuk 16: Rekenaarvirusse”. In: Van Pletsen, F, DOS: ’n Handleiding vir rekenaarentoesiaste. De Jager-HAUM, 1989. isbn: 978-0-7986-3018-4
1988
- Vergelyking van die Spoed van Transputers met dié van Bestaande
Hooframe van SGRB
Full text
Abstract
BibTeX entry
M. S. Olivier and R. F. Breedt. Vergelyking van die Spoed van Transputers met dié van Bestaande Hooframe van SGRB. Interne verslag IKOMP 88/12. WNNR, Sept. 1988
1987
- Die
Ondersteuning van Abstrakte Datatipes en Toestelle in ’n Programmeertaal
BibTeX entry
M. S. Olivier. “Die Ondersteuning van Abstrakte Datatipes en Toestelle in ’n Programmeertaal”. In: Tweede Jaarlikse Konferensie vir M.Sc en Ph.D Rekenaarwetenskapstudente. Onbeoordeeld. Stellenbosch, Suid-Afrika, Sept. 1987
1986
- BIND Gebruikershandleiding
BibTeX entry
M. S. Olivier. BIND Gebruikershandleiding. Interne verslag I700. Pretoria, Suid-Afrika: NNWW, WNNR, July 1986 -
Gebruikershandleiding vir die Motorola MC68020-ontsamesteller
BibTeX entry
M. S. Olivier. Gebruikershandleiding vir die Motorola MC68020-ontsamesteller. Interne verslag I695. Pretoria, Suid-Afrika: NNWW, WNNR, June 1986
1985
- Die
Ondersteuning van Abstrakte Datatipes en Toestelle in ’n Programmeertaal
Abstract
BibTeX entry
M. S. Olivier. “Die Ondersteuning van Abstrakte Datatipes en Toestelle in ’n Programmeertaal”. M.Sc-verhandeling. Johannesburg, Suid-Afrika: Randse Afrikaanse Universiteit, 1985
(Also see the DBLP Bibliography Server, the ACM Digital Library and Google Scholar.)