Publications
On Network Security, Privacy and Forensics
[ Full text Paper available] [ Full (protected) Paper available upon request] [ Abstract Abstract]
[ BibTeX entry
BibTeX reference entry] [ Publisher site Authoritative version of paper on publisher’s site]
2011-2015
-
Beacons and their uses for digital forensics purposes
Abstract
BibTeX entry
Publisher site
L. L. Lubbe and M. S. Olivier. “Beacons and their uses for digital forensics purposes”. In: 2015 Information Security for South Africa (ISSA). 2015, pp. 1–6 - Malware Forensics
BibTeX entry
M. S. Olivier. “Malware Forensics”. In: Official (ISC)2® Guide to the CCFP CBK. Ed. by P. Stephenson. CRC, 2014, pp. 707–737 - Design of a hybrid command
and control mobile botnet
Full text
Abstract
BibTeX entry
Publisher site
H Pieterse and M. S. Olivier. “Design of a hybrid command and control mobile botnet”. In: Journal of Information Warfare 12.1 (2013). (Journal version of Pieterse and Olivier, “Design of a Hybrid Command and Control Mobile Botnet”), pp. 70–82 - A Taxonomy of
Web Service Attacks
Abstract
BibTeX entry
Publisher site
K. F. P. Chan, M. S. Olivier, and R. P. van Heerden. “A Taxonomy of Web Service Attacks”. In: Proceedings of ICIW 2013 — The 8th International Conference on Information Warfare and Security. Ed. by D. Hart. Denver, Colorado, USA: Academic Conferences and Publishing, Mar. 2013, pp. 34–42 - A Near-Miss Management System
to Facilitate Forensic Investigation of Software Failures
Full text
Abstract
BibTeX entry
M. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “A Near-Miss Management System to Facilitate Forensic Investigation of Software Failures”. In: Proceedings of the 13th European Conference on Cyber Warfare and Security. Ed. by A. Liaropoulos and G. Tsihrintzis. Academic Conferences, 2014, pp. 233–241 -
Bluetooth Command and Control channel
Abstract
BibTeX entry
Publisher site
H. Pieterse and M. S. Olivier. “Bluetooth Command and Control channel”. In: Computers & Security 45 (2014), pp. 75–83 - Smartphones as Distributed Witnesses for Digital
Forensics
Abstract
BibTeX entry
Publisher site
H. Pieterse and M. S. Olivier. “Smartphones as Distributed Witnesses for Digital Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson and S. Shenoi. Springer, 2014, pp. 237–251 - Cloud
Separation: Stuck inside the cloud
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Delport and M. S. Olivier. “Cloud Separation: Stuck inside the cloud”. In: Trust, Privacy and Security in Digital Business — 9th International conference, TrustBus, 2012 Vienna, Austria, September 2012, Proceedings. Ed. by S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr. LNCS 7449. Springer, 2012, pp. 36–49 -
Android botnets on the rise: Trends and characteristics
Full text
BibTeX entry
Publisher site
H. Pieterse and M. S. Olivier. “Android botnets on the rise: Trends and characteristics”. In: Information Security for South Africa (ISSA), 2012. IEEE, 2012, pp. 1–5 - Isolating instances in the cloud
Full text
Full (protected)
Abstract
BibTeX entry
Publisher site
W. Delport and M. S. Olivier. “Isolating instances in the cloud”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi. Springer, 2012, pp. 187–200 - Analysing the fairness of trust-based Mobile Ad
Hoc Network protocols
Full text
Abstract
BibTeX entry
I. D. Burke and M. S. Olivier. “Analysing the fairness of trust-based Mobile Ad Hoc Network protocols”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Published electronically). Johannesburg, South Africa, Aug. 2011 - Network Forensics in a
Clean-slate Internet Architecture
Full text
Abstract
BibTeX entry
T. Strauss and M. S. Olivier. “Network Forensics in a Clean-slate Internet Architecture”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Published electronically). Aug. 2011 - Isolating a Cloud Instance for a Digital Forensic Investigation
Full text
Abstract
BibTeX entry
W. Delport, M. S. Olivier, and M. D. Köhn. “Isolating a Cloud Instance for a Digital Forensic Investigation”. In: Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper; published electronically). Johannesburg, South Africa, Aug. 2011 - Location
Privacy: privacy, efficiency and recourse through a prohibitive contract
Abstract
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “Location Privacy: privacy, efficiency and recourse through a prohibitive contract”. In: Transactions on Data Privacy 4.1 (2011), pp. 19–30
2006-2010
- In Search of Search Privacy
Abstract
BibTeX entry
Publisher site
W. Brandi and M. S. Olivier. “In Search of Search Privacy”. In: Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2010). Ed. by S. Katsikas, J. Lopez, and M. Soriano. Vol. 6264. Lecture Notes in Computer Science. 2010, pp. 102–116 -
Framework for Developing Realistic MANET Simulations
Abstract
BibTeX entry
I. Burke, S. Naidoo, and M. S. Olivier. “Framework for Developing Realistic MANET Simulations”. In: Proceedings of ICIW 2010 — The 5th International Conference on Information-Warfare & Security. Wright-Patterson Air Force Base, Ohio, USA, Apr. 2010, pp. 65–71 - Pattern-Based Approach for Logical Traffic
Isolation Forensic Modelling
Abstract
BibTeX entry
Publisher site
I. Z. Dlamini, M. S. Olivier, and S. Sibiya. “Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling”. In: Twentieth International Workshop on Database and Expert Systems Applications. Ed. by A. M. Tjoa and R. R. Wagner. IEEE Computer Society, 2009, pp. 145–149 - The design of a logical traffic isolation forensic model
Full text
Abstract
BibTeX entry
I. Z. Dlamini and M. S. Olivier. “The design of a logical traffic isolation forensic model”. In: Proceedings of the ISSA 2009 Conference. Ed. by H. S. Venter, M. Coetzee, and L. Labuschagne. (Research in progress paper, published electronically). Johannesburg, South Africa, July 2009 - A
Simulation of Logical Traffic Isolation Using Differentiated Services
BibTeX entry
I. Z. Dlamini, M. S. Olivier, and M. Grobler. “A Simulation of Logical Traffic Isolation Using Differentiated Services”. In: Proceedings of the 4th International Workshop on Digital Forensics & Incident Analysis, WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information Security & Network Research, University of Plymouth, 2009, pp. 20–27 - A fraud
management system architecture for next-generation networks
Abstract
BibTeX entry
Publisher site
M. A. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “A fraud management system architecture for next-generation networks”. In: Forensic Science International 185.1-3 (2009), pp. 51–58 - A comparison of simulated
traffic conditioner performance
BibTeX entry
Publisher site
T. Strauss, D. G. Kourie, and M. S. Olivier. “A comparison of simulated traffic conditioner performance”. In: Computer Communications 31.17 (2008), pp. 3933–3940 - Bridging the
gap between anonymous e-mail and anonymous Web browsing
Full text
Abstract
BibTeX entry
Publisher site
H. Tillwick and M. S. Olivier. “Bridging the gap between anonymous e-mail and anonymous Web browsing”. In: Online Information Review 32.1 (2008), pp. 22–34 - A Silent SMS Denial of Service (DoS) Attack
Full text
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “A Silent SMS Denial of Service (DoS) Attack”. In: Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007) Proceedings. (Published Electronically). Sugar Beach Resort, Mauritius, Sept. 2007 - Acquisition of a
Symbian Smart phone’s Content with an On-Phone Forensic Tool
Full text
BibTeX entry
P. M. Mokhonoana and M. S. Olivier. “Acquisition of a Symbian Smart phone’s Content with an On-Phone Forensic Tool”. In: Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007) Proceedings. (Published Electronically). Sugar Beach Resort, Mauritius, Sept. 2007 - Title: Exposing anonymous network participants via an external
attack
BibTeX entry
W. A. Brandi and M. S. Olivier. “Title: Exposing anonymous network participants via an external attack”. In: South African Computer Journal 37 (2006), pp. 12–18 - The use of self-organising maps for anomalous
behaviour detection in a digital investigation
BibTeX entry
Publisher site
B. K. L. Fei, J. H. P. Eloff, M. S. Olivier, and H. S. Venter. “The use of self-organising maps for anomalous behaviour detection in a digital investigation”. In: Forensic Science International 162.1–3 (2006), pp. 33–37 - Using image steganography for decryptor
distribution
BibTeX entry
Publisher site
T. Morkel, J. H. P. Eloff, and M. S. Olivier. “Using image steganography for decryptor distribution”. In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. Ed. by R. Meersman, Z. Tari, and P. Herrero. Vol. 4277. LNCS. Springer, 2006, pp. 322–330 - Extending
P3P to Facilitate Proxies which Pose as a Potential Threat to Privacy
BibTeX entry
Publisher site
W. A. Brandi and M. S. Olivier. “Extending P3P to Facilitate Proxies which Pose as a Potential Threat to Privacy”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 81–90 - Information
leakage in ubiquitous Voice-over-IP
Full text
BibTeX entry
Publisher site
T. Neumann, H. Tillwick, and M. S. Olivier. “Information leakage in ubiquitous Voice-over-IP”. In: Trust, Privacy and Security in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 233–242 - Anonymous
Mobile Conference Calls
Full text
Abstract
BibTeX entry
N. J. Croft and M. S. Olivier. “Anonymous Mobile Conference Calls”. In: Southern African Telecommunication Networks and Applications Conference 2006 (SATNAC 2006) Proceedings. Ed. by D. Browne. Vol. 1. Stellenbosch, South Africa, Sept. 2006, pp. 411–416 - On
bidder zones, cell phones and ballot stuffing
Full text
Abstract
BibTeX entry
W. A. Brandi and M. S. Olivier. “On bidder zones, cell phones and ballot stuffing”. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference. Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Published electronically. Sandton, South Africa, July 2006 - Sequenced Release of Privacy
Accurate Call Data Record Information in a GSM Forensic Investigation
Full text
BibTeX entry
N. J. Croft and M. S. Olivier. “Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation”. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference. Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Published electronically. Sandton, South Africa, July 2006 - Active Traffic Capture
for Network Forensics
Abstract
BibTeX entry
Publisher site
M. L. Slaviero, A. Granova, and M. S. Olivier. “Active Traffic Capture for Network Forensics”. In: Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi. Springer, 2006, pp. 215–228 - Differentiated Services for Logical Traffic Isolation
Abstract
BibTeX entry
Publisher site
T. Strauss, M. S. Olivier, and D. G. Kourie. “Differentiated Services for Logical Traffic Isolation”. In: Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi. Springer, 2006, pp. 229–237 - Network Forensics:
Web Proxy Log Analysis
Abstract
BibTeX entry
Publisher site
B. K. L. Fei, J. H. P. Eloff, M. S. Olivier, and H. S. Venter. “Network Forensics: Web Proxy Log Analysis”. In: Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi. Springer, 2006, pp. 247–258
2001-2005
- Distributed Proxies for Browsing Privacy
— A Simulation of Flocks
Full text
Abstract
BibTeX entry
M. S. Olivier. “Distributed Proxies for Browsing Privacy — A Simulation of Flocks”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 104–112 - Towards a
framework for connection anonymity
Full text
Abstract
BibTeX entry
Publisher site
H. Tillwick and M. S. Olivier. “Towards a framework for connection anonymity”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 113–122 - A
Simulation Study of Traffic Conditioner Performance
BibTeX entry
M. D. Strauss, D. G. Kourie, and M. S. Olivier. “A Simulation Study of Traffic Conditioner Performance”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 171–181 - A fraud detection model for Next-Generation Networks
Full text
BibTeX entry
M. A. Bihina Bella, M. S. Olivier, and J. H. P. Eloff. “A fraud detection model for Next-Generation Networks”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 321–326 -
Using an approximated One-Time Pad to Secure Short Messaging Service
(SMS)
Full text
BibTeX entry
N. J. Croft and M. S. Olivier. “Using an approximated One-Time Pad to Secure Short Messaging Service (SMS)”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 71–76 - Detecting Uncooperative Ethernet
Elements using Accurate Round-trip Time Measurements
Full text
Abstract
BibTeX entry
J. P. Delport and M. S. Olivier. “Detecting Uncooperative Ethernet Elements using Accurate Round-trip Time Measurements”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 153–156 - Enhancements to SIP to prevent abuse of
Voice-over-IP services
Full text
Abstract
BibTeX entry
T. Neumann and M. S. Olivier. “Enhancements to SIP to prevent abuse of Voice-over-IP services”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 359–364 - Incorporating Prejudice into Trust
Models to Reduce Network Overload
Full text
BibTeX entry
M. Wojcik, H. S. Venter, J. H. P. Eloff, and M. S. Olivier. “Incorporating Prejudice into Trust Models to Reduce Network Overload”. In: Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 195–200 - Flocks: Distributed Proxies for Browsing Privacy
Full text
BibTeX entry
M. S. Olivier. “Flocks: Distributed Proxies for Browsing Privacy”. In: South African Computer Journal 34 (2005), pp. 33–40 - Codec-Hopping: Secure and
Private Voice Communication in Bandwidth Constrained Networks
BibTeX entry
N. J. Croft, M. S. Olivier, and H. S. Venter. “Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks”. In: Proceedings of the First International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2005). Ed. by P Georgiadis, S Gritzalis, and G. F. Marias. Diavlos Publications, July 2005, pp. 85–91 - Polar: Proxies Collaborating to Achieve Anonymous Web
Browsing
BibTeX entry
H. Tillwick, T. Neumann, M. S. Olivier, H. S. Venter, and J. H. P. Eloff. “Polar: Proxies Collaborating to Achieve Anonymous Web Browsing”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 317–324 - Using Compatible Keys in Achieving Subscriber
Privacy Channelling for Billing in GSM Networks
BibTeX entry
N. J. Croft and M. S. Olivier. “Using Compatible Keys in Achieving Subscriber Privacy Channelling for Billing in GSM Networks”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 245–252 - Choosing A Deterministic
Function For Use With DAOMAP, the Distributed Allocation Of Multicast
Addresses Protocol
BibTeX entry
M. L. Slaviero and M. S. Olivier. “Choosing A Deterministic Function For Use With DAOMAP, the Distributed Allocation Of Multicast Addresses Protocol”. In: Proceedings of the Fifth International Network Conference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July 2005, pp. 105–112 - Using Self-Organising Maps for
Anomalous Behaviour Detection in a Computer Forensic Investigation
Full text
Abstract
BibTeX entry
B. K. L. Fei, J. H. P. Eloff, M. S. Olivier, H. M. Tillwick, and H. S. Venter. “Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 - Using
the IPDR standard for NGN billing and fraud detection
Full text
Abstract
BibTeX entry
M. A. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “Using the IPDR standard for NGN billing and fraud detection”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. E. L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 - A
Model for Spam Prevention in Voice over IP Networks using Anonymous
Verifying Authorities
Full text
BibTeX entry
N. J. Croft and M. S. Olivier. “A Model for Spam Prevention in Voice over IP Networks using Anonymous Verifying Authorities”. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Ed. by H. S. Venter, J. H. P. Eloff, L. Labuschagne, and M. M. Eloff. Research in progress paper, published electronically. Sandton, South Africa, June 2005 - Forensics and Privacy-enhancing Technologies — Logging
and Collecting Evidence in Flocks
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Forensics and Privacy-enhancing Technologies — Logging and Collecting Evidence in Flocks”. In: Advances in Digital Forensics. Ed. by M. Pollitt and S. Shenoi. Springer, 2005, pp. 17–31 - Exploring Data generated by
Computer Forensic Tools with Self-Organizing Maps
Full (protected)
Abstract
BibTeX entry
Publisher site
B. K. L. Fei, J. H. P. Eloff, H. S. Venter, and M. S. Olivier. “Exploring Data generated by Computer Forensic Tools with Self-Organizing Maps”. In: Advances in Digital Forensics. Ed. by M. Pollitt and S. Shenoi. Springer, 2005, pp. 113–123 - Flocks: Distributed Proxies for Browsing Privacy
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “Flocks: Distributed Proxies for Browsing Privacy”. In: Proceedings of SAICSIT 2004 — fulfilling the promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo. Also published as a journal paper Olivier, “Flocks: Distributed Proxies for Browsing Privacy”. Stellenbosch, South Africa, Oct. 2004, pp. 79–88 - Towards a Hippocratic Log File
Architecture
Full text
Abstract
BibTeX entry
Publisher site
A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards a Hippocratic Log File Architecture”. In: Proceedings of SAICSIT 2004 — fulfilling the promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo. Stellenbosch, South Africa, Oct. 2004, pp. 186–193 - The use
of a Third Party Proxy in Achieving GSM Anonymity
Full text
Abstract
BibTeX entry
Publisher site
N. J. Croft and M. S. Olivier. “The use of a Third Party Proxy in Achieving GSM Anonymity”. In: Southern African Telecommunication Networks and Applications Conference 2004 (SATNAC 2004). Ed. by D. Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004 - DAOMAP: A
Distributed IPv6 Multicast Address Allocating Protocol
Full text
Abstract
BibTeX entry
M. Slaviero and M. S. Olivier. “DAOMAP: A Distributed IPv6 Multicast Address Allocating Protocol”. In: Southern African Telecommunication Networks and Applications Conference 2004 (SATNAC 2004). Ed. by D. Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004 - Towards
Hippocratic Log files
Full text
Abstract
BibTeX entry
A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards Hippocratic Log files”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - On Privacy and the Web
Full text
Abstract
BibTeX entry
W. A. Brandi and M. S. Olivier. “On Privacy and the Web”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Published electronically. Midrand, South Africa, June 2004 - A Layered Security Architecture: Design Issues
Full text
Abstract
BibTeX entry
H. Tillwick and M. S. Olivier. “A Layered Security Architecture: Design Issues”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Work in progress paper, published electronically. Midrand, South Africa, June 2004 - An approach to build a
fortified network logger that is resilient to cracking attempts
Full text
Abstract
BibTeX entry
J. Kroon and M. S. Olivier. “An approach to build a fortified network logger that is resilient to cracking attempts”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Work in progress paper, published electronically. Midrand, South Africa, June 2004 - Curtailing Web defacement using a read-only strategy
Full text
Abstract
BibTeX entry
A. Cooks and M. S. Olivier. “Curtailing Web defacement using a read-only strategy”. In: Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004). Work in progress paper, published electronically. Midrand, South Africa, June 2004 - A Layered Architecture for
Privacy-enhancing Technologies
Full text
BibTeX entry
M. S. Olivier. “A Layered Architecture for Privacy-enhancing Technologies”. In: Proceedings of the Third Annual Information Security South Africa Conference (ISSA2003). Ed. by J. H. P. Eloff, H. S. Venter, L. Labuschagne, and M. M. Eloff. Journal version also published Olivier, “A Layered Architecture for Privacy-enhancing Technologies”. Sandton, South Africa, July 2003, pp. 113–126 - Implementing Workflow
with Microsoft’s Distributed Object Model (DCOM)
Full (protected)
Abstract
BibTeX entry
Publisher site
L. C. J. Dreyer and M. S. Olivier. “Implementing Workflow with Microsoft’s Distributed Object Model (DCOM)”. In: Research Directions in Database and Application Security. Ed. by E. Gudes and S. Shenoi. Kluwer, 2003, pp. 61–72 - Wrappers — a mechanism to support state-based authorisation
in Web applications
Full text
Abstract
BibTeX entry
Publisher site
M. S. Olivier and E. Gudes. “Wrappers — a mechanism to support state-based authorisation in Web applications”. In: Data and Knowledge Engineering 43.3 (2002), pp. 281–292 - A
Chinese Wall Approach to Privacy Policies for The Web
Full (protected)
Abstract
BibTeX entry
Publisher site
F. A. Lategan and M. S. Olivier. “A Chinese Wall Approach to Privacy Policies for The Web”. In: 26th Annual International Computer Software and Applications Conference (COMPSAC 2002). Oxford, UK: IEEE, 2002, pp. 940–944 - Wrappers — a mechanism to support state-based authorisation in Web
applications
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier and E. Gudes. “Wrappers — a mechanism to support state-based authorisation in Web applications”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari. Journal version also published Olivier and Gudes, “Wrappers — a mechanism to support state-based authorisation in Web applications”. Kluwer, 2001, pp. 149–160
1995-2000
-
Security and Privacy Issues for the World Wide Web: Panel Discussion
Full (protected)
Abstract
BibTeX entry
Publisher site
B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson, and M. S. Olivier. “Security and Privacy Issues for the World Wide Web: Panel Discussion”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 269–284 - Secure Mobile Nodes in Federated
Databases
Full text
Abstract
BibTeX entry
M. S. Olivier. “Secure Mobile Nodes in Federated Databases”. In: South African Computer Journal 20 (1997), pp. 11–17 -
Increasing Firewall Reliability by Recording Routes
Full (protected)
Abstract
BibTeX entry
Publisher site
P. M. Boshoff and M. S. Olivier. “Increasing Firewall Reliability by Recording Routes”. In: Communications and Multimedia Security II. Ed. by P Horster. Chapman & Hall, 1996, pp. 303–314 - A Prototype for Personal Business
Transactions on Public Networks
Full text
Abstract
BibTeX entry
E. J. Uphof and M. S. Olivier. “A Prototype for Personal Business Transactions on Public Networks”. In: Proceedings of the IFIP TC11 Workgroup 11.2 on Small System Security. Ed. by J. H. P. Eloff. Unrefereed. Samos, Greece, May 1996, pp. 13–27 - A
Heuristic for Securing Hypertext Systems
Full (protected)
Abstract
BibTeX entry
Publisher site
M. S. Olivier. “A Heuristic for Securing Hypertext Systems”. In: Communications and Multimedia Security. Ed. by R Posch. Chapman & Hall, 1995, pp. 43–54 -
Managing Information Security in a Client/Server Environment with Distributed
Object-oriented Role-based Security
BibTeX entry
J. van der Merwe, S. H. von Solms, and M. S. Olivier. “Managing Information Security in a Client/Server Environment with Distributed Object-oriented Role-based Security”. In: IT Sicherheit ’95. Poster. Graz, Austria, Sept. 1995
(Also see the DBLP Bibliography Server, the ACM Digital Library and Google Scholar.)