Martin S Olivier
Publications
On Privacy
[All Topics]
[On Privacy]
[On Secure Workflow]
[On Secure Interoperation]
[On Database Security]
[On Secure Systems]
[On Digital Forensics]
[Popular Media]
[Essays]
- K Reddy, HS Venter and MS Olivier, "Using time-driven activity-based costing to manage digital forensic readiness in large organisations,"
Information Systems Frontiers, 14, 5, 1061-1077, 2012
[Publisher's site]
- MS Olivier, JHP Eloff, HS Venter and ME Botes,
"Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities,"
South African Computer Journal, 47, 2011, 47-57
[Publisher's site]
- WJC van Staden and MS Olivier,
"On Compound Purposes and Compound Reasons for Enabling Privacy,"
Journal of Universal Computer Science, 17, 3, 426-450, 2011
- NJ Croft and MS Olivier,
"Location privacy: privacy, efficiency and recourse through a prohibitive contract,"
Transactions on Data Privacy, 4, 1, 19-30, 2011
- MS Olivier, JHP Eloff, HS Venter and ME Botes,
"Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities,"
South African Computer Journal, 2011 (Accepted for publication)
- W Brandi and MS Olivier,
"In search of search privacy,
in Proceedings of the 7th International Conference on Trust, Privacy and Security in
Digital Business (TrustBus 2010), S Katsikas, J Lopez and M Soriano
(eds), vol. 6264 of Lecture Notes in Computer Science, 102-116, 2010
- NJ Croft and MS Olivier,
"Sequenced release of privacy-accurate information in a forensic investigation,"
Digital Investigation, 7, 1-2, 95-101, 2010
- MP Zielinski and MS Olivier,
On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation,
Data & Knowledge Engineering,
69, 5, 399-423, 2010
- HJG Oberholzer and MS Olivier,
Emergency Privacy Measures,
Accepted for presentation at the
International Symposium on Privacy and Security Applications (PSA09),
Vancouver, Canada, 29-31 August 2009
- MP Zielinski and MS Olivier,
How appropriate is k-anonymity for addressing the conflict between
privacy and information utility in microdata anonymisation?
in
HS Venter, M Coetzee and L Labuschagne (eds),
Proceedings of the ISSA 2009 Conference,
Johannesburg, South Africa, July 2009
(Published electronically)
- K Reddy, HS Venter, MS Olivier and I Currie,
"Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy",
in
L Korba, S Marsh and R Safavi-Naini (eds),
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust,
56-64, IEEE, 2008
- W Brandi, MS Olivier and A Zugenmaier,
"Preservation of Privacy in Thwarting the Ballot Stuffing Scheme",
in
S. Furnell, S. K. Katsikas, and A. Lioy (eds),
Privacy and Security in Digital Business, LNCS 5185, Springer, 2008
- H Tillwick and MS Olivier,
"Bridging the Gap between Anonymous E-mail and Anonymous Web Browsing,"
Online Information Review, 32, 1, 22-34, 2008
- WJC van Staden and MS Olivier,
"SQL's Revoke with a View on Privacy,"
in
L Barnard and RA Botha (eds),
Proceedings of SAICSIT 2007 Annual Research Conference of the
South African Institute of Computer Scientists and Information
Technologists,
181-188,
Fish River, South Africa, October 2007
- W van Staden and MS Olivier,
"Using purpose lattices to facilitate customisation of privacy agreements,"
in
C Lambrinoudakis, G Pernul, and AM Tjoa (eds),
Trust, Privacy and Security in Digital Business,
LNCS 4657, 201-209, 2007
- W van Staden and MS Olivier,
"Privaatheid en komplekse redes in 'n databasis,"
Die Suid-Afrikaanse Tydskrif vir Natuurwetenskap en Tegnologie,
26, 2, p171, 2007 (Slegs abstrak)
- HN Olinger, JJ Britz and MS Olivier,
"Western privacy and/or ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa,"
International Information and Library Review, 39, 1, 31-43, 2007
- WA Brandi and MS Olivier,
"Exposing anonymous network participants via an external attack,"
South African Computer Journal, 37, 12-18, 2006
- WA Brandi and MS Olivier,
"Extending P3P to facilitate proxies which pose as a potential threat to privacy,"
in
S Fischer-Hübner, S Furnell and C Lambrinoudakis (eds),
Trust, Privacy and Security in Digital Business,
LNCS 4083,
81-90,
Springer, 2006
- WJC van Staden and MS Olivier,
"Extending SQL to allow the active usage of purposes,"
in
S Fischer-Hübner, S Furnell and C Lambrinoudakis (eds),
Trust, Privacy and Security in Digital Business,
LNCS 4083,
123-131,
Springer, 2006
- T Neumann, H Tillwick and MS Olivier,
"Information Leakage in Ubiquitous Voice-over-IP,"
in
S Fischer-Hübner, S Furnell and C Lambrinoudakis (eds),
Trust, Privacy and Security in Digital Business,
LNCS 4083,
233-242,
Springer, 2006
- NJ Croft and MS Olivier,
"Anonymous Mobile Conference Calls",
in D Browne (ed),
Proceedings of the Southern African Telecommunication Networks and Applications Conference (SATNAC) 2006,
411-416, Stellenbosch, South Africa, 2006
- WA Brandi and MS Olivier,
"On Bidder Zones, Cell Phones and Ballot Stuffing,"
in
HS Venter, JHP Eloff, L Labuschagne and MM Eloff (eds),
Proceedings of the ISSA 2006 from Insight to Foresight Conference,
Sandton, South Africa, July 2006 (Published electronically)
- NJ Croft and MS Olivier,
"Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation,"
in
HS Venter, JHP Eloff, L Labuschagne and MM Eloff (eds),
Proceedings of the ISSA 2006 from Insight to Foresight Conference,
Sandton, South Africa, July 2006 (Published electronically)
- HJG Oberholzer and MS Olivier,
"Privacy contracts incorporated in a privacy protection framework,"
Computer Systems Science and Engineering,
21, 1, 5-16, 2006
- MS Olivier,
"Distributed Proxies for Browsing Privacy - A Simulation of Flocks,"
in
J Bishop and DG Kourie (eds),
Research for a changing world - Proceedings of SAICSIT 2005,
104-112,
White River, South Africa, September 2005
- H Tillwick and MS Olivier,
"Towards a Framework for Connection Anonymity,"
in
J Bishop and DG Kourie (eds),
Research for a changing world - Proceedings of SAICSIT 2005,
113-122,
White River, South Africa, September 2005
-
MS Olivier,
"Flocks: Distributed Proxies for Browsing Privacy,"
South African Computer Journal, 34, 33-40, 2005
- HN Olinger, JJ Britz and MS Olivier,
"Western privacy and ubuntu - influences in the forthcoming data privacy bill,"
in
P Brey, F Grodzinsky and L Introna (eds),
Ethics of New Information Technology - Proceedings of the Sixth International
Conference of Computer Ethics: Philosophical Enquiry (CEPE2005),
Enschede, The Netherlands,
291-306, July 2005.
- HM Tillwick, T Neumann, MS Olivier, HS Venter and JHP Eloff,
"Polar: Proxies Collaborating to Achieve Anonymous Web Browsing,"
in
SM Furnell, PS Dowland and G Kormentzas (eds),
Proceedings of the Fifth International Network Conference (INC2005),
Samos, Greece,
317-324,
July 2005
- NJ Croft and MS Olivier,
"Using Compatible Keys in Achieving Subscriber Privacy Channelling
for Billing in GSM Networks,"
in
SM Furnell, PS Dowland and G Kormentzas (eds),
Proceedings of the Fifth International Network Conference (INC2005),
Samos, Greece,
245-252,
July 2005
- HS Venter, MS Olivier, JHP Eloff and ME Botes,
"Balancing Patient Privacy and Treatment Facility Accountability using a Centralised Pseudonymous HIV/AIDS Database,"
in
SM Furnell, PS Dowland and G Kormentzas (eds),
Proceedings of the Fifth International Network Conference (INC2005),
Samos, Greece,
377-384,
July 2005
- W van Staden and MS Olivier
"Purpose Organisation,"
in
HS Venter, JHP Eloff, L Labuschagne and MM Eloff (eds),
Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005),
Sandton, South Africa, June/July 2005 (Research in progress paper, published electronically)
- HJG Oberholzer and MS Olivier,
"Privacy Contracts as an Extension of Privacy Policies,"
Proceedings of the International Workshop on Privacy Data Management (PDM 2005), 11-19,
Tokyo, Japan, April 2005
- MS Olivier,
"Forensics and Privacy-enhancing Technologies - Logging and Collecting Evidence in Flocks,"
in
M Pollitt and S Shenoi (eds),
Advances in Digital Forensics,
17-31,
Springer, 2005
-
MS Olivier,
"Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data,"
South African Computer Journal, 33, 78-88, 2004 (In
press)
-
HS Venter, MS Olivier and JHP Eloff,
"PIDS: A Privacy Intrusion Detection System,"
Internet Research, 14, 5, 360-365, 2004
- MS Olivier,
"Flocks: Distributed Proxies for Browsing Privacy,"
in G Marsden, P Kotzé and A Adesina-Ojo (eds),
Proceedings of SAICSIT 2004 - fulfilling the promise of ICT,
79-88,
Stellenbosch, South Africa, October 2004
(See later journal version)
- A Rutherford, RA Botha and MS Olivier,
"Towards a Hippocratic Log File Architecture,"
in
G Marsden, P Kotzé and A Adesina-Ojo (eds),
Proceedings of SAICSIT 2004 - fulfilling the promise of ICT,
186-193,
Stellenbosch, South Africa, October 2004
- NJ Croft and MS Olivier,
"The Use of a Third Party Proxy in Achieving GSM Anonymity,"
in Southern African Telecommunication Networks and
Applications Conference 2004 (SATNAC 2004),
D Browne (ed), Stellenbosch, South Africa, September 2004
(Published electronically)
- MS Olivier,
"Privacy Under Conditions of Concurrent Interaction with Multiple Parties,"
in
S de Capitani di Vimercati, I Ray and I Ray (eds),
Data and Applications Security XVII - Status and Prospects,
105-118, Kluwer, 2004
- HS Venter, MS Olivier and JHP Eloff,
"PIDS: A Privacy Intrusion Detection System,"
in
SM Furnell and PS Dowland (eds),
Proceedings of the Fourth International Network
Conference,
Plymouth, UK, 255-262,
July 2004
(See later journal version)
- A Rutherford, RA Botha and MS Olivier,
"Towards Hippocratic Log Files,"
in Proceedings of the Fourth Annual Information Security
South Africa Conference (ISSA2004),
Midrand, South Africa, June/July 2004
(Published electronically)
- WA Brandi and MS Olivier,
"On Privacy and the Web,"
in Proceedings of the Fourth Annual Information Security
South Africa Conference (ISSA2004),
Midrand, South Africa, June/July 2004
(Published electronically)
- MS Olivier,
"A Layered Architecture for Privacy-enhancing Technologies,"
South African Computer Journal,
31, 53-61, 2003
- MS Olivier,
"Using Organisational Safeguards to Make Justifiable Decisions when Processing Personal Data",
in
JHP Eloff, P Kotzé, AP Engelbrecht and MM Eloff (eds),
IT Research in Developing Countries (SAICSIT 2003),
Sandton, South Africa, 275-284, September 2003
(See later journal version)
- MS Olivier,
"A Layered Architecture for Privacy-enhancing Technologies,"
in
JHP Eloff, HS Venter, L Labuschagne, and MM Eloff (eds),
Proceedings of the Third Annual Information Security South Africa
Conference (ISSA2003),
Sandton, South Africa, 113-126, July 2003
- D Chadwick, MS Olivier, P Samarati,
E Sharpston and B Thuraisingham,
"Privacy and Civil Liberties",
in
E Gudes and S Shenoi (eds),
Research Directions in Database and Application Security,
331-346, Kluwer, 2003
- W Teepe, RP van de Riet and MS Olivier,
"Workflow Analyzed for Security and Privacy in Using Databases,"
Journal of Computer Security, 11, 3, 353-364,
2003
- MS Olivier,
"Database Privacy",
SIGKDD Explorations, 4, 2, 20-27, 2003
- FA Lategan and MS Olivier,
"PrivGuard: A model to protect private information based on its usage",
South African Computer Journal, 29, 58-68, 2002
- FA Lategan and MS Olivier
"A Chinese Wall Approach to Privacy Policies for The Web",
26th Annual International Computer Software and Applications
Conference (COMPSAC 2002), Oxford, UK, 940-944, IEEE, 2002
- MS Olivier,
"Personal Privacy and Lyotard's Inhuman,"
unpublished essay, 2002
- W Teepe, RP van de Riet and MS Olivier,
"WorkFlow Analyzed for Security and Privacy in using Databases,"
in
B Thuraisingham, RP van de Riet, KR Dittrich and Z Tari (eds),
Data and Applications Security - Developments and Directions,
271-282, Kluwer, 2001
- FA Lategan and MS Olivier,
"On granting limited access to private information,"
Proceedings of the Tenth International World Wide Web
Conference, 21-25, ACM, 2001
- FA Lategan and MS Olivier,
"Enforcing privacy by withholding private information,"
in S Qing and JHP Eloff, Information Security for Global
Information Infrastructures, 421-430,
Kluwer, 2000
- B Thuraisingham, S Jajodia, P Samarati, J Dobson and MS Olivier,
"Security and Privacy Issues for the World Wide Web: Panel Discussion,"
in S Jajodia (ed), Database Security XII: Status and
Prospects, 269-284, Kluwer, 1999
- LCJ Dreyer and MS Olivier,
"An Information-Flow Model for Privacy (InfoPriv),"
in S Jajodia (ed), Database Security XII: Status and
Prospects, 77-90, Kluwer, 1999
- LCJ Dreyer and MS Olivier
"Dynamic Aspects of the InfoPriv Model for Information Privacy,"
in R Wagner (ed), Proceedings of the Ninth International
Workshop on Security of Data Intensive Applications (DEXA 98),
340-345, IEEE, 1998
- LCJ Dreyer and MS Olivier,
"A Workbench for Privacy Policies,"
Twenty-Second Annual International Computer Software
and
Applications Conference, Vienna, Austria, 18-21 August 1998
[Home]
[Research]
[Publications]
[Courses]
[M & D]
[Resume]
[Personal]
[Blog]
[Contact]
Page maintained by
Martin Olivier
Last update: 13 July 2013