Publications
On Privacy
[ Full text Paper available] [ Full (protected) Paper available upon request] [ Abstract Abstract]
[ BibTeX entry
BibTeX reference entry] [ Publisher site Authoritative version of paper on publisher’s site]
2016-2019
-
Digital forensic science: A manifesto
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Digital forensic science: A manifesto”. In: South African Computer Journal 28.2 (2016). Editorial, pp. 46–49 - On the Need for Social Contract Theory in the Ethics of
Digital Forensics
Abstract
BibTeX entry
M. S. Olivier. “On the Need for Social Contract Theory in the Ethics of Digital Forensics”. In: AAFS 68th Annual Scientific Meeting. (Oral presentation; abstract included in proceedings). Las Vegas, Nevada, USA, Feb. 2016
2011-2015
- Beacons and their uses for digital forensics purposes
Abstract
BibTeX entry
Publisher site
L. L. Lubbe and M. S. Olivier. “Beacons and their uses for digital forensics purposes”. In: 2015 Information Security for South Africa (ISSA). 2015, pp. 1–6 -
On Compound Purposes and Compound Reasons for Enabling Privacy
Abstract
BibTeX entry
Publisher site
W. J. C. van Staden and M. S. Olivier. “On Compound Purposes and Compound Reasons for Enabling Privacy”. In: Journal of Universal Computer Science 17.3 (2011), pp. 426–450 - Using e-coins to ensure
fair sharing of donor funds amongst HIV healthcare facilities
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier, J. H. P. Eloff, H. S. Venter, and M. E. Botes. “Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities”. In: South African Computer Journal (2011), pp. 47–57 - Location
Privacy: privacy, efficiency and recourse through a prohibitive contract
Abstract
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “Location Privacy: privacy, efficiency and recourse through a prohibitive contract”. In: Transactions on Data Privacy 4.1 (2011), pp. 19–30
2006-2010
- In Search of Search Privacy
Abstract
BibTeX entry
Publisher site
W. Brandi and M. S. Olivier. “In Search of Search Privacy”. In: Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2010). Ed. by S. Katsikas, J. Lopez, and M. Soriano. Vol. 6264. Lecture Notes in Computer Science. 2010, pp. 102–116 -
On the use of economic price theory to find the optimum levels of privacy
and information utility in non-perturbative microdata anonymisation
Abstract
BibTeX entry
Publisher site
M. P. Zielinski and M. S. Olivier. “On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation”. In: Data & Knowledge Engineering 69.5 (2010), pp. 399–423 - Emergency Privacy Measures
Abstract
BibTeX entry
Publisher site
H. J. G. Oberholzer and M. S. Olivier. “Emergency Privacy Measures”. In: International Conference on Computational Science and Engineering, 2009 (CSE ’09). Vol. 3. IEEE, 2009, pp. 324–329 - How appropriate is
k-anonymity for addressing the conflict between privacy and information utility in
microdata anonymisation?
Full text
BibTeX entry
M. P. Zielinski and M. S. Olivier. “How appropriate is k-anonymity for addressing the conflict between privacy and information utility in microdata anonymisation?” In: Proceedings of the ISSA 2009 Conference. Ed. by H. S. Venter, M. Coetzee, and L. Labuschagne. (Published electronically). Johannesburg, South Africa, July 2009 - Towards
Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer
Information Privacy
Abstract
BibTeX entry
Publisher site
K. Reddy, H. S. Venter, M. S. Olivier, and I. Currie. “Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy”. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust. Ed. by L. Korba, S. Marsh, and R. Safavi-Naini. IEEE, 2008, pp. 56–64 - Preservation of
Privacy in Thwarting the Ballot Stuffing Scheme
Abstract
BibTeX entry
Publisher site
W. Brandi, M. S. Olivier, and A. Zugenmaier. “Preservation of Privacy in Thwarting the Ballot Stuffing Scheme”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Furnell, S. K. Katsikas, and A. Lioy. Vol. 5185. LNCS. Springer, 2008, pp. 195–204 - Bridging the gap between anonymous e-mail and anonymous Web
browsing
Full text
Abstract
BibTeX entry
Publisher site
H. Tillwick and M. S. Olivier. “Bridging the gap between anonymous e-mail and anonymous Web browsing”. In: Online Information Review 32.1 (2008), pp. 22–34 - SQL’s Revoke with a View
on Privacy
Full text
BibTeX entry
Publisher site
W. van Staden and M. S. Olivier. “SQL’s Revoke with a View on Privacy”. In: Proceedings of SAICSIT 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists. Ed. by L. Barnard and R. A. Botha. (Published electronically). Fish River, South Africa, Oct. 2007, pp. 181–188 - Using Purpose
Lattices to Facilitate Customisation of Privacy Agreements
BibTeX entry
Publisher site
W. J. C. van Staden and M. S. Olivier. “Using Purpose Lattices to Facilitate Customisation of Privacy Agreements”. In: Trust, Privacy and Security in Digital Business. Ed. by C. Lambrinoudakis, G. Pernul, and A. M. Tjoa. Vol. 4657. LNCS. Springer, 2007, pp. 201–209 - Privaatheid en Komplekse Redes in ’n
Databasis
BibTeX entry
W. J. C. van Staden and M. S. Olivier. “Privaatheid en Komplekse Redes in ’n Databasis”. In: Die Suid-Afrikaanse Tydskrif vir Natuurwetenskap en Tegnologie 26.2 (2007). (Slegs abstrak), p. 171 - Western
Privacy and/or Ubuntu? Some Critical Comments on the Influences in the
Forthcoming Data Privacy Bill in South Africa
BibTeX entry
Publisher site
H. N. Olinger, J. J. Britz, and M. S. Olivier. “Western Privacy and/or Ubuntu? Some Critical Comments on the Influences in the Forthcoming Data Privacy Bill in South Africa”. In: International Information and Library Review 39.1 (2007), pp. 31–43 - Title: Exposing anonymous network participants via an
external attack
BibTeX entry
W. A. Brandi and M. S. Olivier. “Title: Exposing anonymous network participants via an external attack”. In: South African Computer Journal 37 (2006), pp. 12–18 - Extending P3P to Facilitate Proxies
which Pose as a Potential Threat to Privacy
BibTeX entry
Publisher site
W. A. Brandi and M. S. Olivier. “Extending P3P to Facilitate Proxies which Pose as a Potential Threat to Privacy”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 81–90 - Extending SQL to Allow the Active Usage of Purposes
BibTeX entry
Publisher site
W. J. C. van Staden and M. S. Olivier. “Extending SQL to Allow the Active Usage of Purposes”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 123–131 - Information leakage in
ubiquitous Voice-over-IP
Full text
BibTeX entry
Publisher site
T. Neumann, H. Tillwick, and M. S. Olivier. “Information leakage in ubiquitous Voice-over-IP”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 233–242 - Anonymous
Mobile Conference Calls
Full text
Abstract
BibTeX entry
N. J. Croft and M. S. Olivier. “Anonymous Mobile Conference Calls”. In: Southern African Telecommunication Networks and Applications Conference 2006 (SATNAC 2006) Proceedings. Ed. by D. Browne. Vol. 1. Stellenbosch, South Africa, Sept. 2006, pp. 411–416 -
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM
Forensic Investigation
Full text
BibTeX entry
N. J. Croft and M. S. Olivier. “Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation”. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference. Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Published electronically. Sandton, South Africa, July 2006 - Privacy contracts
incorporated in a privacy protection framework
Full text
BibTeX entry
H. J. G. Oberholzer and M. S. Olivier. “Privacy contracts incorporated in a privacy protection framework”. In: Computer Systems Science and Engineering 21.1 (2006), pp. 5–16
2001-2005
- Distributed Proxies for Browsing Privacy — A Simulation of
Flocks
Full text
Abstract
BibTeX entry
M. S. Olivier. “Distributed Proxies for Browsing Privacy — A Simulation of Flocks”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 104–112 - Towards a framework for
connection anonymity
Full text
Abstract
BibTeX entry
Publisher site
H. Tillwick and M. S. Olivier. “Towards a framework for connection anonymity”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 113–122 - Western Privacy
and Ubuntu — Influences in the Forthcoming Data Privacy Bill
Full text
BibTeX entry
H. N. Olinger, J. J. Britz, and M. S. Olivier. “Western Privacy and Ubuntu — Influences in the Forthcoming Data Privacy Bill”. In: Ethics of New Information Technology — Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005). Ed. by P. Brey, F. Grodzinsky, and L. Introna. Enschede, The Netherlands, July 2005, pp. 291–306 - Flocks: Distributed Proxies for Browsing Privacy
Full text
BibTeX entry
M. S. Olivier. “Flocks: Distributed Proxies for Browsing Privacy”. In: South African Computer Journal 34 (2005), pp. 33–40 - Polar: Proxies Collaborating
to Achieve Anonymous Web Browsing
BibTeX entry
H. Tillwick, T. Neumann, M. S. Olivier, H. S. Venter, and J. H. P. Eloff. “Polar: Proxies Collaborating to Achieve Anonymous Web Browsing”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 317–324 - Using Compatible Keys in
Achieving Subscriber Privacy Channelling for Billing in GSM Networks
BibTeX entry
N. J. Croft and M. S. Olivier. “Using Compatible Keys in Achieving Subscriber Privacy Channelling for Billing in GSM Networks”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 245–252 - Balancing
Patient Privacy and Treatment Facility Accountability using a Centralised
Pseudonymous HIV/AIDS Database
Abstract
BibTeX entry
H. S. Venter, M. S. Olivier, J. H. P. Eloff, and M. E. Botes. “Balancing Patient Privacy and Treatment Facility Accountability using a Centralised Pseudonymous HIV/AIDS Database”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 377–384 - Purpose Organisation
Full text
Abstract
BibTeX entry
W. J. C. van Staden and M. S. Olivier. “Purpose Organisation”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 -
Privacy Contracts as an Extension of Privacy Policies
Full text
BibTeX entry
Publisher site
H. J. G. Oberholzer and M. S. Olivier. “Privacy Contracts as an Extension of Privacy Policies”. In: Proceedings of the International Workshop on Privacy Data Management (PDM 2005). Tokyo, Japan, Apr. 2005, pp. 11–19 -
Forensics and Privacy-enhancing Technologies — Logging and Collecting
Evidence in Flocks
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Forensics and Privacy-enhancing Technologies — Logging and Collecting Evidence in Flocks”. In: Advances in Digital Forensics. Ed. by M. Pollitt and S. Shenoi. Springer, 2005, pp. 17–31 - Using Organisational Safeguards to Make Justifiable Decisions when
Processing Personal Data
Full text
BibTeX entry
Publisher site
M. S. Olivier. “Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data”. In: South African Computer Journal 33 (2004), pp. 78–88 - PIDS: A Privacy
Intrusion Detection System
BibTeX entry
Publisher site
H. S. Venter, M. S. Olivier, and J. H. P. Eloff. “PIDS: A Privacy Intrusion Detection System”. In: Internet Research 14.5 (2004), pp. 360–365 - Flocks: Distributed Proxies for Browsing
Privacy
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Flocks: Distributed Proxies for Browsing Privacy”. In: Proceedings of SAICSIT 2004 — fulfilling the promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo. Also published as a journal paper Olivier, “Flocks: Distributed Proxies for Browsing Privacy”. Stellenbosch, South Africa, Oct. 2004, pp. 79–88 - Towards a
Hippocratic Log File Architecture
Full text
Abstract
BibTeX entry
Publisher site
A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards a Hippocratic Log File Architecture”. In: Proceedings of SAICSIT 2004 — fulfilling the promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo. Stellenbosch, South Africa, Oct. 2004, pp. 186–193 - The use of a Third Party Proxy in Achieving
GSM Anonymity
Full text
Abstract
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “The use of a Third Party Proxy in Achieving GSM Anonymity”. In: Southern African Telecommunication Networks and Applications Conference 2004 (SATNAC 2004). Ed. by D. Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004 - Privacy under Conditions of Concurrent Interaction with
Multiple Parties
Full (protected)
BibTeX entry
Publisher site
M. S. Olivier. “Privacy under Conditions of Concurrent Interaction with Multiple Parties”. In: Data and Applications Security XVII — Status and Prospects. Ed. by S. de Capitani di Vimercati, I. Ray, and I. Ray. Kluwer, 2004, pp. 105–118 - PIDS: A Privacy Intrusion
Detection System
Full text
BibTeX entry
H. S. Venter, M. S. Olivier, and J. H. P. Eloff. “PIDS: A Privacy Intrusion Detection System”. In: Proceedings of the Fourth International Network Conference. Ed. by S. M. Furnell and P. S. Dowland. Journal version also published Venter, Olivier, and Eloff, “PIDS: A Privacy Intrusion Detection System”. Plymouth, UK, July 2004, pp. 255–262 - Towards
Hippocratic Log files
Full text
Abstract
BibTeX entry
A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards Hippocratic Log files”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - Design Issues: A Virtual Machine for
Security in a Relational Database Management System
Full text
Abstract
BibTeX entry
W. J. C. van Staden and M. S. Olivier. “Design Issues: A Virtual Machine for Security in a Relational Database Management System”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - On Privacy and the Web
Full text
Abstract
BibTeX entry
W. A. Brandi and M. S. Olivier. “On Privacy and the Web”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - A Layered Security Architecture: Design Issues
Full text
Abstract
BibTeX entry
H. Tillwick and M. S. Olivier. “A Layered Security Architecture: Design Issues”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Work in progress paper, published electronically. Midrand, South Africa, June 2004 - A Layered Architecture for
Privacy-enhancing Technologies
Full text
BibTeX entry
M. S. Olivier. “A Layered Architecture for Privacy-enhancing Technologies”. In: South African Computer Journal 31 (2003), pp. 53–61 - Using Organisational Safeguards to Make Justifiable
Decisions when Processing Personal Data
Full text
BibTeX entry
M. S. Olivier. “Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data”. In: IT Research in Developing Countries (SAICSIT 2003). Ed. by J. H. P. Eloff, P. Kotzé, A. P. Engelbrecht, and M. M. Eloff. Journal version also published Olivier, “Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data”. Sandton, South Africa, Sept. 2003, pp. 275–284 - A Layered Architecture for Privacy-enhancing Technologies
Full text
BibTeX entry
M. S. Olivier. “A Layered Architecture for Privacy-enhancing Technologies”. In: Proceedings of the Third Annual Information Security South Africa Conference (ISSA2003). Ed. by J. H. P. Eloff, H. S. Venter, L. Labuschagne, and M. M. Eloff. Journal version also published Olivier, “A Layered Architecture for Privacy-enhancing Technologies”. Sandton, South Africa, July 2003, pp. 113–126 - Privacy and Civil Liberties
Full (protected)
BibTeX entry
Publisher site
D. Chadwick, M. S. Olivier, P. Samarati, E. Sharpston, and B. Thuraishingham. “Privacy and Civil Liberties”. In: Research Directions in Database and Application Security. Ed. by E. Gudes and S. Shenoi. Kluwer, 2003, pp. 331–346 - WorkFlow Analyzed for Security and Privacy in using Databases
Full (protected)
BibTeX entry
Publisher site
W. Teepe, R. P. van de Riet, and M. S. Olivier. “WorkFlow Analyzed for Security and Privacy in using Databases”. In: Journal of Computer Security 11.3 (2003), pp. 353–364 - Database Privacy
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Database Privacy”. In: SigKDD Explorations 4.2 (2003), pp. 20–27 -
PrivGuard: A model to protect private information based on its usage
Full text
BibTeX entry
F. A. Lategan and M. S. Olivier. “PrivGuard: A model to protect private information based on its usage”. In: South African Computer Journal 29 (2002), pp. 58–68 - Wrappers — a mechanism to support state-based authorisation
in Web applications
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier and E. Gudes. “Wrappers — a mechanism to support state-based authorisation in Web applications”. In: Data and Knowledge Engineering 43.3 (2002), pp. 281–292 -
A Chinese Wall Approach to Privacy Policies for The Web
Full (protected)
Abstract
BibTeX entry
Publisher site
F. A. Lategan and M. S. Olivier. “A Chinese Wall Approach to Privacy Policies for The Web”. In: 26th Annual International Computer Software and Applications Conference (COMPSAC 2002). Oxford, UK: IEEE, 2002, pp. 940–944 - WorkFlow Analyzed for Security and Privacy in using
Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Teepe, R. P. van de Riet, and M. S. Olivier. “WorkFlow Analyzed for Security and Privacy in using Databases”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari. Also published as a journal paper Teepe, van de Riet, and Olivier, “WorkFlow Analyzed for Security and Privacy in using Databases”. Kluwer, 2001, pp. 271–282 - On granting limited access to private
information
Full text
Abstract
BibTeX entry
Publisher site
F. A. Lategan and M. S. Olivier. “On granting limited access to private information”. In: Proceedings of the Tenth International World Wide Web Conference. ACM, 2001, pp. 21–25
1998-2000
- A
comparison of two architectures for implementing Security and Privacy in
Cyberspace
Abstract
BibTeX entry
Publisher site
R. P. van de Riet, W. Janssen, M. S. Olivier, and R. Serban. “A comparison of two architectures for implementing Security and Privacy in Cyberspace”. In: Database and Expert Systems Applications. DEXA 2000. Ed. by M. Ibrahim, J. Küng, and N. Revell. Vol. 1873. Lecture Notes in Computer Science. Springer, 2000, pp. 287–301 - Enforcing privacy by
withholding private information
Full (protected)
Abstract
BibTeX entry
Publisher site
F. A. Lategan and M. S. Olivier. “Enforcing privacy by withholding private information”. In: Information Security for Global Information Infrastructures. Ed. by S Qing and J. H. P. Eloff. Kluwer, 2000, pp. 421–430 - Security and Privacy Issues for the
World Wide Web: Panel Discussion
Full (protected)
Abstract
BibTeX entry
Publisher site
B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson, and M. S. Olivier. “Security and Privacy Issues for the World Wide Web: Panel Discussion”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 269–284 -
An Information-Flow Model for Privacy (InfoPriv)
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
L. C. J. Dreyer and M. S. Olivier. “An Information-Flow Model for Privacy (InfoPriv)”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 77–90 - Dynamic Aspects of the InfoPriv Model
for Information Privacy
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
L. C. J. Dreyer and M. S. Olivier. “Dynamic Aspects of the InfoPriv Model for Information Privacy”. In: Proceedings of the Ninth International Workshop on Security of Data Intensive Applications (DEXA 98). Ed. by R Wagner. IEEE, 1998, pp. 340–345 - A Workbench for Privacy Policies
Full text
Full (protected)
BibTeX entry
Publisher site
L. C. J. Dreyer and M. S. Olivier. “A Workbench for Privacy Policies”. In: Twenty-Second Annual International Computer Software and Applications Conference. Vienna, Austria, Aug. 1998
(Also see the DBLP Bibliography Server, the ACM Digital Library and Google Scholar.)