[ Paper available] [ Paper available upon request] [ Abstract] [ BibTeX reference entry] [ Authoritative version of paper on publisher's site]
2011–2014
“Cloud Separation: Stuck inside the cloud” W. Delport and M. S. Olivier. “Cloud Separation: Stuck inside the cloud”.
In: Trust, Privacy and Security in Digital Business — 9th Internationalconference, TrustBus, 2012 Vienna, Austria, September 2012, Proceedings.
Ed. by S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr. LNCS 7449.
Springer, 2012, pp. 36–49
“Isolating instances in the cloud” W. Delport and M. S. Olivier. “Isolating instances in the cloud”. In:
Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 187–200
“Finding File Fragments in the Cloud” D. Ras and M. S. Olivier. “Finding File Fragments in the Cloud”. In:
Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 169–185
“Analysing the fairness of trust-based Mobile Ad Hoc Network protocols” I. D. Burke and M. S. Olivier. “Analysing the fairness of trust-based
Mobile Ad Hoc Network protocols”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Published electronically).
Johannesburg, South Africa, Aug. 2011
“Network Forensics in a Clean-slate Internet Architecture” T. Strauss and M. S. Olivier. “Network Forensics in a Clean-slate Internet
Architecture”. In: Proceedings of the 2011 Information Security for SouthAfrica (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M.
Loock. (Published electronically). Aug. 2011
“Isolating a Cloud Instance for a Digital Forensic Investigation” W. Delport, M. S. Olivier, and M. D. Köhn. “Isolating a Cloud
Instance for a Digital Forensic Investigation”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
2006–2010
“Framework for Developing Realistic MANET Simulations” I. Burke, S. Naidoo, and M. S. Olivier. “Framework for Developing
Realistic MANET Simulations”. In: Proceedings of ICIW 2010 —The 5th International Conference on Information-Warfare & Security.
Wright-Patterson Air Force Base, Ohio, USA, Apr. 2010, pp. 65–71
“A Configurable Security Architecture Prototype” A. Hardy and M. S. Olivier. “A Configurable Security Architecture
Prototype”. In: Data and Applications Security — Developments andDirections. Ed. by B. Thuraisingham et al. Kluwer, 2001, pp. 51–62
“A comparison of two architectures for implementing Security and Privacy
in Cyberspace” R. P. van de Riet et al. “A comparison of two architectures for
implementing Security and Privacy in Cyberspace”. In: Database andExpert Systems Applications. DEXA 2000. Ed. by M. Ibrahim, J. Küng,
and N. Revell. Vol. 1873. Lecture Notes in Computer Science. Springer,
2000, pp. 287–301
“Security Policies in Replicated and Autonomous Databases” E. Gudes and M. S. Olivier. “Security Policies in Replicated and
Autonomous Databases”. In: Database Security XII: Status and Prospects.
Ed. by S. Jajodia. Kluwer, 1999, pp. 93–107
An implementation of the Chinese Wall security model using ConSA F. A. Lategan and M. S. Olivier. An implementation of the ChineseWall security model using ConSA. Internal Report. Unpublished.
Johannesburg, South Africa: Department of Computer Science, Rand
Afrikaans University, 1998
“Integrity Constraints in Federated Databases” M. S. Olivier. “Integrity Constraints in Federated Databases”. In:
Database Security X: Status and Prospects. Ed. by P. Samarati and R. S.
Sandhu. Chapman & Hall, 1997, pp. 43–57
“Supporting Site Security Policies for Members of Federated Databases” M. S. Olivier. “Supporting Site Security Policies for Members of Federated
Databases”. In: Proceedings of the Fourth European Conference onInformation Systems. Ed. by J. D. Coelho et al. Lisbon, Portugal, July
1996, pp. 45–56
“Self-protecting Objects in a Secure Federated Database” M. S. Olivier. “Self-protecting Objects in a Secure Federated Database”.
In: Database Security IX: Status and Prospects. Ed. by D. L. Spooner,
S. A. Demurjian, and J. E. Dobson. Chapman & Hall, 1996, pp. 27–42
“A Multilevel Secure Federated Database” M. S. Olivier. “A Multilevel Secure Federated Database”. In: DatabaseSecurity VIII (A-60). Ed. by J. Biskup, M Morgenstern, and C. E.
Landwehr. Elsevier Science, 1995, pp. 183–198
[ Paper available] [ Paper available upon request] [ Paper not yet available] [ Abstract] [ Full citation information] [ BibTeX reference entry] [ Authoritative version of paper on publisher's site]
Some icons used under a CC licence from http://prokofusha.deviantart.com