“In Search of Search Privacy” W. Brandi and M. S. Olivier. “In Search of Search Privacy”. In:
Proceedings of the 7th International Conference on Trust, Privacy andSecurity in Digital Business (TrustBus 2010). Ed. by S. Katsikas, J. Lopez,
and M. Soriano. Vol. 6264. Lecture Notes in Computer Science. 2010,
pp. 102–116
“Emergency Privacy Measures” H. J. G. Oberholzer and M. S. Olivier. “Emergency Privacy Measures”.
In: International Conference on Computational Science and Engineering,2009 (CSE ’09). Vol. 3. IEEE, 2009, pp. 324–329
“Preservation of Privacy in Thwarting the Ballot Stuffing Scheme” W. Brandi, M. S. Olivier, and A. Zugenmaier. “Preservation of Privacy in
Thwarting the Ballot Stuffing Scheme”. In: Trust, Privacy and Security inDigital Business. Ed. by S. Furnell, S. K. Katsikas, and A. Lioy. Vol. 5185.
LNCS. Springer, 2008, pp. 195–204
“SQL’s Revoke with a View on Privacy” W. van Staden and M. S. Olivier. “SQL’s Revoke with a View on Privacy”.
In: Proceedings of SAICSIT 2007 Annual Research Conference of the SouthAfrican Institute of Computer Scientists and Information Technologists.
Ed. by L. Barnard and R. A. Botha. (Published electronically). Fish River,
South Africa, Oct. 2007, pp. 181–188
“Using Purpose Lattices to Facilitate Customisation of Privacy
Agreements” W. J. C. van Staden and M. S. Olivier. “Using Purpose Lattices to
Facilitate Customisation of Privacy Agreements”. In: Trust, Privacy andSecurity in Digital Business. Ed. by C. Lambrinoudakis, G. Pernul, and
A. M. Tjoa. Vol. 4657. LNCS. Springer, 2007, pp. 201–209
“Privaatheid en Komplekse Redes in ’n Databasis” W. J. C. van Staden and M. S. Olivier. “Privaatheid en Komplekse Redes
in ’n Databasis”. In: Die Suid-Afrikaanse Tydskrif vir Natuurwetenskapen Tegnologie 26.2 (2007). (Slegs abstrak), p. 171
“Extending P3P to Facilitate Proxies which Pose as a Potential Threat to
Privacy” W. A. Brandi and M. S. Olivier. “Extending P3P to Facilitate Proxies
which Pose as a Potential Threat to Privacy”. In: Trust, Privacy andSecurity in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C.
Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 81–90
“Extending SQL to Allow the Active Usage of Purposes” W. J. C. van Staden and M. S. Olivier. “Extending SQL to Allow the
Active Usage of Purposes”. In: Trust, Privacy and Security in DigitalBusiness. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis.
Vol. 4083. LNCS. Springer, 2006, pp. 123–131
“Information leakage in ubiquitous Voice-over-IP” T. Neumann, H. Tillwick, and M. S. Olivier. “Information leakage in
ubiquitous Voice-over-IP”. In: Trust, Privacy and Security in DigitalBusiness. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis.
Vol. 4083. LNCS. Springer, 2006, pp. 233–242
“Anonymous Mobile Conference Calls” N. J. Croft and M. S. Olivier. “Anonymous Mobile Conference Calls”.
In: Southern African Telecommunication Networks and ApplicationsConference 2006 (SATNAC 2006) Proceedings. Ed. by D. Browne. Vol. 1.
Stellenbosch, South Africa, Sept. 2006, pp. 411–416
“Distributed Proxies for Browsing Privacy — A Simulation of Flocks” M. S. Olivier. “Distributed Proxies for Browsing Privacy — A Simulation
of Flocks”. In: Research for a changing world — Proceedings of SAICSIT2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept.
2005, pp. 104–112
“Towards a framework for connection anonymity” H. Tillwick and M. S. Olivier. “Towards a framework for connection
anonymity”. In: Research for a changing world — Proceedings of SAICSIT2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept.
2005, pp. 113–122
“Western Privacy and Ubuntu — Influences in the Forthcoming Data
Privacy Bill” H. N. Olinger, J. J. Britz, and M. S. Olivier. “Western Privacy and
Ubuntu — Influences in the Forthcoming Data Privacy Bill”. In: Ethicsof New Information Technology — Proceedings of the Sixth InternationalConference of Computer Ethics: Philosophical Enquiry (CEPE2005). Ed.
by P. Brey, F. Grodzinsky, and L. Introna. Enschede, The Netherlands,
July 2005, pp. 291–306
“Polar: Proxies Collaborating to Achieve Anonymous Web Browsing” H. Tillwick et al. “Polar: Proxies Collaborating to Achieve Anonymous
Web Browsing”. In: Proceedings of the Fifth International NetworkConference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G.
Kormentzas. Samos, Greece, July 2005, pp. 317–324
“Using Compatible Keys in Achieving Subscriber Privacy Channelling for
Billing in GSM Networks” N. J. Croft and M. S. Olivier. “Using Compatible Keys in Achieving
Subscriber Privacy Channelling for Billing in GSM Networks”. In:
Proceedings of the Fifth International Network Conference (INC2005). Ed.
by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July
2005, pp. 245–252
“Purpose Organisation” W. J. C. van Staden and M. S. Olivier. “Purpose Organisation”.
In: Proceedings of the Fifth Annual Information Security South AfricaConference (ISSA2005). Ed. by H. S. Venter et al. Research in progress
paper, published electronically. Sandton, South Africa, June 2005
“Privacy Contracts as an Extension of Privacy Policies” H. J. G. Oberholzer and M. S. Olivier. “Privacy Contracts as an Extension
of Privacy Policies”. In: Proceedings of the International Workshop onPrivacy Data Management (PDM 2005). Tokyo, Japan, Apr. 2005,
pp. 11–19
“PIDS: A Privacy Intrusion Detection System” H. S. Venter, M. S. Olivier, and J. H. P. Eloff. “PIDS: A Privacy Intrusion
Detection System”. In: Internet Research 14.5 (2004), pp. 360–365
“Towards a Hippocratic Log File Architecture” A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards a Hippocratic
Log File Architecture”. In: Proceedings of SAICSIT 2004 — fulfillingthe promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo.
Stellenbosch, South Africa, Oct. 2004, pp. 186–193
“The use of a Third Party Proxy in Achieving GSM Anonymity” N. J. Croft and M. S. Olivier. “The use of a Third Party Proxy in
Achieving GSM Anonymity”. In: Southern African TelecommunicationNetworks and Applications Conference 2004 (SATNAC 2004). Ed. by D.
Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004
“Privacy under Conditions of Concurrent Interaction with Multiple
Parties” M. S. Olivier. “Privacy under Conditions of Concurrent Interaction with
Multiple Parties”. In: Data and Applications Security XVII — Status andProspects. Ed. by S. de Capitani di Vimercati, I. Ray, and I. Ray. Kluwer,
2004, pp. 105–118
“PIDS: A Privacy Intrusion Detection System” H. S. Venter, M. S. Olivier, and J. H. P. Eloff. “PIDS: A Privacy Intrusion
Detection System”. In: Proceedings of the Fourth International NetworkConference. Ed. by S. M. Furnell and P. S. Dowland. Journal version also
published Venter, Olivier, and Eloff, “PIDS: A Privacy Intrusion Detection
System”. Plymouth, UK, July 2004, pp. 255–262
“Towards Hippocratic Log files” A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards Hippocratic Log
files”. In: Proceedings of the Fourth Annual Information Security SouthAfrica Conference (ISSA2004). Published electronically. Midrand, South
Africa, June 2004
“Design Issues: A Virtual Machine for Security in a Relational Database
Management System” W. J. C. van Staden and M. S. Olivier. “Design Issues: A Virtual
Machine for Security in a Relational Database Management System”.
In: Proceedings of the Fourth Annual Information Security South AfricaConference (ISSA2004). Published electronically. Midrand, South Africa,
June 2004
“On Privacy and the Web” W. A. Brandi and M. S. Olivier. “On Privacy and the Web”. In:
Proceedings of the Fourth Annual Information Security South AfricaConference (ISSA2004). Published electronically. Midrand, South Africa,
June 2004
“A Layered Security Architecture: Design Issues” H. Tillwick and M. S. Olivier. “A Layered Security Architecture: Design
Issues”. In: Proceedings of the Fourth Annual Information SecuritySouth Africa Conference (ISSA2004). Work in progress paper, published
electronically. Midrand, South Africa, June 2004
“Privacy and Civil Liberties” D. Chadwick et al. “Privacy and Civil Liberties”. In: Research Directionsin Database and Application Security. Ed. by E. Gudes and S. Shenoi.
Kluwer, 2003, pp. 331–346
“A Chinese Wall Approach to Privacy Policies for The Web” F. A. Lategan and M. S. Olivier. “A Chinese Wall Approach to Privacy
Policies for The Web”. In: 26th Annual International Computer Softwareand Applications Conference (COMPSAC 2002). Oxford, UK: IEEE, 2002,
pp. 940–944
“On granting limited access to private information” F. A. Lategan and M. S. Olivier. “On granting limited access to private
information”. In: Proceedings of the Tenth International World Wide WebConference. ACM, 2001, pp. 21–25
1998–2000
“A comparison of two architectures for implementing Security and Privacy
in Cyberspace” R. P. van de Riet et al. “A comparison of two architectures for
implementing Security and Privacy in Cyberspace”. In: Database andExpert Systems Applications. DEXA 2000. Ed. by M. Ibrahim, J. Küng,
and N. Revell. Vol. 1873. Lecture Notes in Computer Science. Springer,
2000, pp. 287–301
“Enforcing privacy by withholding private information” F. A. Lategan and M. S. Olivier. “Enforcing privacy by withholding
private information”. In: Information Security for Global InformationInfrastructures. Ed. by S Qing and J. H. P. Eloff. Kluwer, 2000, pp. 421–430
“An Information-Flow Model for Privacy (InfoPriv)” L. C. J. Dreyer and M. S. Olivier. “An Information-Flow Model for Privacy
(InfoPriv)”. In: Database Security XII: Status and Prospects. Ed. by S.
Jajodia. Kluwer, 1999, pp. 77–90
“Dynamic Aspects of the InfoPriv Model for Information Privacy” L. C. J. Dreyer and M. S. Olivier. “Dynamic Aspects of the InfoPriv
Model for Information Privacy”. In: Proceedings of the Ninth InternationalWorkshop on Security of Data Intensive Applications (DEXA 98). Ed. by
R Wagner. IEEE, 1998, pp. 340–345
“A Workbench for Privacy Policies” L. C. J. Dreyer and M. S. Olivier. “A Workbench for Privacy Policies”. In:
Twenty-Second Annual International Computer Software and ApplicationsConference. Vienna, Austria, Aug. 1998
[ Paper available] [ Paper available upon request] [ Paper not yet available] [ Abstract] [ Full citation information] [ BibTeX reference entry] [ Authoritative version of paper on publisher's site]
Some icons used under a CC licence from http://prokofusha.deviantart.com