Publications
On Secure Interoperation
[ Full text Paper available] [ Full (protected) Paper available upon request] [ Abstract Abstract]
[ BibTeX entry
BibTeX reference entry] [ Publisher site Authoritative version of paper on publisher’s site]
2011--2014
-
Cloud Separation: Stuck inside the cloud
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Delport and M. S. Olivier. “Cloud Separation: Stuck inside the cloud”. In: Trust, Privacy and Security in Digital Business — 9th International conference, TrustBus, 2012 Vienna, Austria, September 2012, Proceedings. Ed. by S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr. LNCS 7449. Springer, 2012, pp. 36–49 - Isolating
instances in the cloud
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Delport and M. S. Olivier. “Isolating instances in the cloud”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi. Springer, 2012, pp. 187–200 - Finding File Fragments
in the Cloud
Abstract
BibTeX entry
Publisher site
D. Ras and M. S. Olivier. “Finding File Fragments in the Cloud”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi. Springer, 2012, pp. 169–185 - Analysing the fairness of
trust-based Mobile Ad Hoc Network protocols
Full text
Abstract
BibTeX entry
I. D. Burke and M. S. Olivier. “Analysing the fairness of trust-based Mobile Ad Hoc Network protocols”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Published electronically). Johannesburg, South Africa, Aug. 2011 - Network Forensics in a Clean-slate Internet Architecture
Full text
Abstract
BibTeX entry
T. Strauss and M. S. Olivier. “Network Forensics in a Clean-slate Internet Architecture”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Published electronically). Aug. 2011 - Isolating a Cloud
Instance for a Digital Forensic Investigation
Full text
Abstract
BibTeX entry
W. Delport, M. S. Olivier, and M. D. Köhn. “Isolating a Cloud Instance for a Digital Forensic Investigation”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper; published electronically). Johannesburg, South Africa, Aug. 2011
2006--2010
- Framework for Developing Realistic MANET
Simulations
Abstract
BibTeX entry
I. Burke, S. Naidoo, and M. S. Olivier. “Framework for Developing Realistic MANET Simulations”. In: Proceedings of ICIW 2010 — The 5th International Conference on Information-Warfare & Security. Wright-Patterson Air Force Base, Ohio, USA, Apr. 2010, pp. 65–71
2001--2005
- Wrappers — a mechanism to support state-based authorisation in Web
applications
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier and E. Gudes. “Wrappers — a mechanism to support state-based authorisation in Web applications”. In: Data and Knowledge Engineering 43.3 (2002), pp. 281–292 - Maintaining
Integrity within Mobile Self Protecting Objects
Abstract
BibTeX entry
W. Brandi and M. S. Olivier. “Maintaining Integrity within Mobile Self Protecting Objects”. In: Informatica 26.2 (2002), pp. 117–122 - A Comparison Between ConSA and
Current Linux Security Implementations
Full (protected)
Abstract
BibTeX entry
Publisher site
A. Hardy and M. S. Olivier. “A Comparison Between ConSA and Current Linux Security Implementations”. In: Database and Application Security XV. Ed. by M. S. Olivier and D. L. Spooner. Kluwer, 2002, pp. 211–224 - A Configurable Security
Architecture Prototype
Full (protected)
Abstract
BibTeX entry
Publisher site
A. Hardy and M. S. Olivier. “A Configurable Security Architecture Prototype”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari. Kluwer, 2001, pp. 51–62 - Wrappers — a mechanism to
support state-based authorisation in Web applications
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier and E. Gudes. “Wrappers — a mechanism to support state-based authorisation in Web applications”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari. Journal version also published Olivier and Gudes, “Wrappers — a mechanism to support state-based authorisation in Web applications”. Kluwer, 2001, pp. 149–160 - Towards a Configurable Security
Architecture
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Towards a Configurable Security Architecture”. In: Data and Knowledge Engineering 38.2 (2001), pp. 121–145 -
Maintaining Integrity within Mobile Self Protecting Objects
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Brandi and M. S. Olivier. “Maintaining Integrity within Mobile Self Protecting Objects”. In: Advances in Information Security Management & Small Systems Security. IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security. Ed. by J. H. P. Eloff, L. Labuschagne, R. von Solms, and G. Dhillon. Journal version also published Brandi and Olivier, “Maintaining Integrity within Mobile Self Protecting Objects”. Kluwer, 2001, pp. 45–55
1996--2000
- A comparison of two architectures for implementing
Security and Privacy in Cyberspace
Abstract
BibTeX entry
Publisher site
R. P. van de Riet, W. Janssen, M. S. Olivier, and R. Serban. “A comparison of two architectures for implementing Security and Privacy in Cyberspace”. In: Database and Expert Systems Applications. DEXA 2000. Ed. by M. Ibrahim, J. Küng, and N. Revell. Vol. 1873. Lecture Notes in Computer Science. Springer, 2000, pp. 287–301 - Security
Policies in Replicated and Autonomous Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
E. Gudes and M. S. Olivier. “Security Policies in Replicated and Autonomous Databases”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 93–107 - An implementation of the Chinese Wall security
model using ConSA
Full text
Abstract
BibTeX entry
F. A. Lategan and M. S. Olivier. An implementation of the Chinese Wall security model using ConSA. Internal Report. Unpublished. Johannesburg, South Africa: Department of Computer Science, Rand Afrikaans University, 1998 - Alter-egos and Roles — Supporting Workflow
Security in Cyberspace
Full (protected)
Abstract
BibTeX entry
Publisher site
E. Gudes, R. P. van de Riet, H. F. M. Burg, and M. S. Olivier. “Alter-egos and Roles — Supporting Workflow Security in Cyberspace”. In: Database Security XI: Status and Prospects. Ed. by T. Y. Lin and S. Qian. Chapman & Hall, 1998, pp. 182–195 - A
Computerised Consultation Service for the Computerisation of the Very Small
Small-business Enterprise
BibTeX entry
C. W. Rensleigh and M. S. Olivier. “A Computerised Consultation Service for the Computerisation of the Very Small Small-business Enterprise”. In: South African Computer Journal 20 (1997), pp. 25–35 - Secure Mobile Nodes in Federated Databases
Full text
Abstract
BibTeX entry
M. S. Olivier. “Secure Mobile Nodes in Federated Databases”. In: South African Computer Journal 20 (1997), pp. 11–17 - Integrity Constraints in Federated
Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Integrity Constraints in Federated Databases”. In: Database Security X: Status and Prospects. Ed. by P. Samarati and R. S. Sandhu. Chapman & Hall, 1997, pp. 43–57 - Using
Workflow to Enhance Security in Federated Databases
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Using Workflow to Enhance Security in Federated Databases”. In: Communications and Multimedia Security II. Ed. by P Horster. Chapman & Hall, 1996, pp. 60–71 - Supporting Site Security Policies for Members
of Federated Databases
Full (protected)
Abstract
BibTeX entry
M. S. Olivier. “Supporting Site Security Policies for Members of Federated Databases”. In: Proceedings of the Fourth European Conference on Information Systems. Ed. by J. D. Coelho, T Jelassi, W König, H Krcmar, R O’Callaghan, and M Saaksjarvi. Lisbon, Portugal, July 1996, pp. 45–56 - Self-protecting Objects in a Secure Federated
Database
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Self-protecting Objects in a Secure Federated Database”. In: Database Security IX: Status and Prospects. Ed. by D. L. Spooner, S. A. Demurjian, and J. E. Dobson. Chapman & Hall, 1996, pp. 27–42 - Self-protecting Objects in Multipolicy Federated
Databases: A Prototype
Full text
Abstract
BibTeX entry
M. S. Olivier. Self-protecting Objects in Multipolicy Federated Databases: A Prototype. Internal Report. Unpublished. Johannesburg, South Africa: Department of Computer Science, Rand Afrikaans University, 1996
1995
- A Multilevel Secure Federated Database
Full (protected)
Abstract
BibTeX entry
M. S. Olivier. “A Multilevel Secure Federated Database”. In: Database Security VIII (A-60). Ed. by J. Biskup, M Morgenstern, and C. E. Landwehr. Elsevier Science, 1995, pp. 183–198
(Also see the DBLP Bibliography Server, the ACM Digital Library and Google Scholar.)