“Forensic attribution in NoSQL databases” W. Hauger and M. S. Olivier. “Forensic attribution in NoSQL databases”.
In: 2017 Information Security for South Africa (ISSA). Ed. by H. S. Venter
et al. IEEE, Aug. 2017, pp. 74–82
2011–2015
“The state of Database Forensic research” W. Hauger and M. S. Olivier. “The state of Database Forensic research”.
In: Information Security for South Africa (ISSA). Ed. by H. S. Venter
et al. IEEE, Aug. 2015
“Determining Trigger Involvement During Forensic Attribution in
Databases” W. Hauger and M. S. Olivier. “Determining Trigger Involvement During
Forensic Attribution in Databases”. In: Advances in Digital Forensics XI.
Ed. by G. Peterson and S. Shenoi. Vol. 462. IFIP Advances in Information
and Communication Technology. Springer, 2015, pp. 163–177
“Schema Reconstruction in Database Forensics” O. M. Adedayo and M. S. Olivier. “Schema Reconstruction in Database
Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson and
S. Shenoi. Springer, 2014, pp. 101–116
“On the completeness of reconstructed data for database forensics” O. M. Adedayo and M. S. Olivier. “On the completeness of reconstructed
data for database forensics”. In: Digital Forensics and Cyber Crime. Ed.
by M. Rogers and K. C. Seigfried-Spellar. Lecture Notes of the Institute
for Computer Sciences, Social Informatics and Telecommunications
Engineering 114. Springer, 2013, pp. 220–238
“Gamifying Authentication” C. J. Kroeze and M. S. Olivier. “Gamifying Authentication”. In:
Information Security for South Africa (ISSA), 2012. IEEE, Aug. 2012,
pp. 1–8
“Cloud Separation: Stuck inside the cloud” W. Delport and M. S. Olivier. “Cloud Separation: Stuck inside the cloud”.
In: Trust, Privacy and Security in Digital Business — 9th Internationalconference, TrustBus, 2012 Vienna, Austria, September 2012, Proceedings.
Ed. by S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr. LNCS 7449.
Springer, 2012, pp. 36–49
“Database forensics” O. M. Fasan and M. S. Olivier. “Database forensics”. In: Proceedings ofthe NCS ReCITI. Akwa Ibom, Nigeria, July 2012
“On Dimensions of Reconstruction in Database Forensics” O. M. Fasan and M. S. Olivier. “On Dimensions of Reconstruction
in Database Forensics”. In: Seventh International Annual Workshop onDigital Forensics & Incident Analysis (WDFIA). Hersonissos, Crete,
Greece, June 2012, pp. 97–106
“Arguments and Methods for Database Data Model Forensics” H. Q. Beyers, M. S. Olivier, and G. P. Hancke. “Arguments and Methods
for Database Data Model Forensics”. In: Seventh International Workshopon Digital Forensics & Incident Analysis (WDFIA). Hersonissos, Crete,
Greece, June 2012, pp. 139–149
“Reconstruction in Database Forensics” O. M. Fasan and M. S. Olivier. “Reconstruction in Database Forensics”.
In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 273–287
“Data Hiding Techniques for Database Environments” H. Pieterse and M. S. Olivier. “Data Hiding Techniques for Database
Environments”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson
and S. Shenoi. Springer, 2012, pp. 289–301
“An Approach to Examine the Metadata and Data of a Database
Management System by making use of a Forensic Comparison Tool” H. Beyers, M. S. Olivier, and G. P. Hancke. “An Approach to Examine
the Metadata and Data of a Database Management System by making
use of a Forensic Comparison Tool”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
“Assembling the Metadata for a Database Forensic Examination” H. Beyers, M. S. Olivier, and G. P. Hancke. “Assembling the Metadata
for a Database Forensic Examination”. In: Advances in Digital ForensicsVII. Ed. by G. Peterson and S. Shenoi. Springer, 2011, pp. 89–99
“SQL’s Revoke with a View on Privacy” W. van Staden and M. S. Olivier. “SQL’s Revoke with a View on Privacy”.
In: Proceedings of SAICSIT 2007 Annual Research Conference of the SouthAfrican Institute of Computer Scientists and Information Technologists.
Ed. by L. Barnard and R. A. Botha. (Published electronically). Fish River,
South Africa, Oct. 2007, pp. 181–188
“Privaatheid en Komplekse Redes in ’n Databasis” W. J. C. van Staden and M. S. Olivier. “Privaatheid en Komplekse Redes
in ’n Databasis”. In: Die Suid-Afrikaanse Tydskrif vir Natuurwetenskapen Tegnologie 26.2 (2007). (Slegs abstrak), p. 171
“Extending SQL to Allow the Active Usage of Purposes” W. J. C. van Staden and M. S. Olivier. “Extending SQL to Allow the
Active Usage of Purposes”. In: Trust, Privacy and Security in DigitalBusiness. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis.
Vol. 4083. LNCS. Springer, 2006, pp. 123–131
“Integrity Constraints in Federated Databases” M. S. Olivier. “Integrity Constraints in Federated Databases”. In:
Database Security X: Status and Prospects. Ed. by P. Samarati and R. S.
Sandhu. Chapman & Hall, 1997, pp. 43–57
“Supporting Site Security Policies for Members of Federated Databases” M. S. Olivier. “Supporting Site Security Policies for Members of Federated
Databases”. In: Proceedings of the Fourth European Conference onInformation Systems. Ed. by J. D. Coelho et al. Lisbon, Portugal, July
1996, pp. 45–56
“MoFAC: A Model for Fine-grained Access Control” J. S. von Solms, M. S. Olivier, and S. H. von Solms. “MoFAC: A Model for
Fine-grained Access Control”. In: Information Systems Security: Facingthe Information Society of the 21st Century. Ed. by S. K. Katsikas and
D Gritzalis. Chapman & Hall, 1996, pp. 295–305
“Self-protecting Objects in a Secure Federated Database” M. S. Olivier. “Self-protecting Objects in a Secure Federated Database”.
In: Database Security IX: Status and Prospects. Ed. by D. L. Spooner,
S. A. Demurjian, and J. E. Dobson. Chapman & Hall, 1996, pp. 27–42
“A Multilevel Secure Federated Database” M. S. Olivier. “A Multilevel Secure Federated Database”. In: DatabaseSecurity VIII (A-60). Ed. by J. Biskup, M Morgenstern, and C. E.
Landwehr. Elsevier Science, 1995, pp. 183–198
“A Taxonomy for Secure Object-oriented Databases” M. S. Olivier and S. H. von Solms. “A Taxonomy for Secure
Object-oriented Databases”. In: ACM Transactions on Database Systems
19.1 (1994), pp. 3–46
“DISCO: A Discretionary Security Model for Object-oriented Databases” M. S. Olivier and S. H. von Solms. “DISCO: A Discretionary Security
Model for Object-oriented Databases”. In: IT Security: The Need forInternational Cooperation. Ed. by G. G. Gable and W. J. Caelli. Elsevier,
1992, pp. 345–357
“Secure Object-oriented Databases” M. S. Olivier. “Secure Object-oriented Databases”. PhD thesis.
Johannesburg: Rand Afrikaans University, 1991
[ Paper available] [ Paper available upon request] [ Paper not yet available] [ Abstract] [ Full citation information] [ BibTeX reference entry] [ Authoritative version of paper on publisher's site]
Some icons used under a CC licence from http://prokofusha.deviantart.com