default search action
Martin S. Olivier
Person information
- affiliation: University of Pretoria, South Africa
Other persons with the same name
- Martin Olivier 0002 — Laval University, CHUL, Québec City, Canada
Other persons with a similar name
- Olivier St-Martin Cormier
- Olivier Martin — disambiguation page
- Olivier C. Martin — INRA Centre de Versailles-Grignon, Versailles, France
- Olivier J. F. Martin
- Olivier Martin-Ducup
- Olivier Martin 0001 — Catholic University of Louvain, Louvain-la-Neuve, Belgium
- Olivier Martin 0002 — Swiss Institute of Bioinformatics, Geneva, Switzerland
- Olivier Martin 0003 — CERN, Geneva, Switzerland
- Olivier Martin 0004 — Joseph Fourier University, Grenoble, France
- Olivier Martin 0005 — INRA, MoSAR, Paris, France
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c105]Martin Olivier:
Digital Forensics and the Big Data Deluge - Some Concerns Based on Ramsey Theory. IFIP Int. Conf. Digital Forensics 2020: 3-23
2010 – 2019
- 2019
- [j34]Heloise Pieterse, Martin Olivier, Renier van Heerden:
Evaluation of smartphone data using a reference architecture. Int. J. Electron. Secur. Digit. Forensics 11(2): 160-182 (2019) - [c104]Heloise Pieterse, Martin S. Olivier, Renier van Heerden:
Classifying the Authenticity of Evaluated Smartphone Data. IFIP Int. Conf. Digital Forensics 2019: 39-57 - 2018
- [j33]Heloise Pieterse, Martin Olivier, Renier van Heerden:
Smartphone data evaluation model: Identifying authentic smartphone data. Digit. Investig. 24: 11-24 (2018) - [c103]Heloise Pieterse, Martin S. Olivier, Renier van Heerden:
Detecting Manipulated Smartphone Data on Android and iOS Devices. ISSA (Revised Selected Papers) 2018: 89-103 - 2017
- [c102]Oluwasayo Oyelami, Martin Olivier:
Establishing Findings in Digital Forensic Examinations: A Case Study Method. IFIP Int. Conf. Digital Forensics 2017: 3-21 - [c101]Heloise Pieterse, Martin S. Olivier, Renier van Heerden:
Evaluating the Authenticity of Smartphone Evidence. IFIP Int. Conf. Digital Forensics 2017: 41-61 - [c100]Werner K. Hauger, Martin S. Olivier:
Forensic attribution in NoSQL databases. ISSA 2017: 74-82 - 2016
- [j32]Martin S. Olivier:
Digital Forensic Science: A Manifesto. South Afr. Comput. J. 28(2) (2016) - [c99]Martin S. Olivier:
On the Morality of Teaching Students IT Crime Skills: Extended Abstract. CSERC 2016: 2-3 - [c98]Martin Olivier:
On a Scientific Theory of Digital Forensics. IFIP Int. Conf. Digital Forensics 2016: 3-24 - 2015
- [j31]Oluwasola Mary Adedayo, Martin S. Olivier:
Ideal log setting for database forensics reconstruction. Digit. Investig. 12: 27-40 (2015) - [c97]Segen Tewelde, Stefan Gruner, Martin S. Olivier:
Notions of Hypothesis in Digital Forensics. IFIP Int. Conf. Digital Forensics 2015: 29-43 - [c96]Oluwasayo Oyelami, Martin S. Olivier:
Using Yin's Approach to Case Studies as a Paradigm for Conducting Examinations. IFIP Int. Conf. Digital Forensics 2015: 45-59 - [c95]Werner K. Hauger, Martin S. Olivier:
Determining Trigger Involvement During Forensic Attribution in Databases. IFIP Int. Conf. Digital Forensics 2015: 163-177 - [c94]Werner K. Hauger, Martin S. Olivier:
The state of database forensic research. ISSA 2015: 1-8 - [c93]Martin S. Olivier:
Towards a digital forensic science. ISSA 2015: 1-8 - [c92]Heloise Pieterse, Martin S. Olivier, Renier P. van Heerden:
Playing hide-and-seek: Detecting the manipulation of Android Timestamps. ISSA 2015: 1-8 - 2014
- [j30]Heloise Pieterse, Martin S. Olivier:
Bluetooth Command and Control channel. Comput. Secur. 45: 75-83 (2014) - [j29]Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
Database application schema forensics. South Afr. Comput. J. 55: 1-11 (2014) - [c91]Oluwasola Mary Adedayo, Martin S. Olivier:
Schema Reconstruction in Database Forensics. IFIP Int. Conf. Digital Forensics 2014: 101-116 - [c90]Heloise Pieterse, Martin S. Olivier:
Smartphones as Distributed Witnesses for Digital Forensics. IFIP Int. Conf. Digital Forensics 2014: 237-251 - [c89]Werner K. Hauger, Martin S. Olivier:
The role of triggers in database forensics. ISSA 2014: 1-7 - [p1]Martin S. Olivier:
Catching the Bug: Pupils and Punched Cards in South Africa in the Late 1970s. Reflections on the History of Computers in Education 2014: 291-301 - 2013
- [c88]Martin S. Olivier, Stefan Gruner:
On the Scientific Maturity of Digital Forensics Research. IFIP Int. Conf. Digital Forensics 2013: 33-49 - [c87]Heloise Pieterse, Martin S. Olivier:
Security steps for smartphone users. ISSA 2013: 1-6 - 2012
- [j28]Oluwasola Mary Fasan, Martin S. Olivier:
Correctness proof for database reconstruction algorithm. Digit. Investig. 9(2): 138-150 (2012) - [j27]Kamil Reddy, H. S. Venter, Martin S. Olivier:
Using time-driven activity-based costing to manage digital forensic readiness in large organisations. Inf. Syst. Frontiers 14(5): 1061-1077 (2012) - [j26]Madeleine Adrienne Bihina Bella, Jan H. P. Eloff, Martin S. Olivier:
Improving system availability with near-miss analysis. Netw. Secur. 2012(10): 18-20 (2012) - [c86]Oluwasola Mary Adedayo, Martin S. Olivier:
On the Completeness of Reconstructed Data for Database Forensics. ICDF2C 2012: 220-238 - [c85]Dirk Ras, Martin S. Olivier:
Finding File Fragments in the Cloud. IFIP Int. Conf. Digital Forensics 2012: 169-185 - [c84]Waldo Delport, Martin S. Olivier:
Isolating Instances in Cloud Forensics. IFIP Int. Conf. Digital Forensics 2012: 187-200 - [c83]Oluwasola Mary Fasan, Martin S. Olivier:
Reconstruction in Database Forensics. IFIP Int. Conf. Digital Forensics 2012: 273-287 - [c82]Heloise Pieterse, Martin S. Olivier:
Data Hiding Techniques for Database Environments. IFIP Int. Conf. Digital Forensics 2012: 289-301 - [c81]Mark-Anthony Fouche, Martin S. Olivier:
Using Internal Depth to Aid Stereoscopic Image Splicing Detection. IFIP Int. Conf. Digital Forensics 2012: 319-333 - [c80]Christien Kroeze, Martin S. Olivier:
Gamifying authentication. ISSA 2012: 1-8 - [c79]Heloise Pieterse, Martin S. Olivier:
Android botnets on the rise: Trends and characteristics. ISSA 2012: 1-5 - [c78]Waldo Delport, Martin S. Olivier:
Cloud Separation: Stuck Inside the Cloud. TrustBus 2012: 36-49 - [c77]Oluwasola Mary Fasan, Martin S. Olivier:
On Dimensions of Reconstruction in Database Forensics. WDFIA 2012: 97-106 - [c76]Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
Arguments and Methods for Database Data Model Forensics. WDFIA 2012: 139-149 - 2011
- [j25]Wynand van Staden, Martin S. Olivier:
On Compound Purposes and Compound Reasons for Enabling Privacy. J. Univers. Comput. Sci. 17(3): 426-450 (2011) - [j24]Martin S. Olivier, Jan H. P. Eloff, Hein S. Venter, Mariette E. Botes:
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities. South Afr. Comput. J. 47: 47-57 (2011) - [j23]Neil J. Croft, Martin S. Olivier:
Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract. Trans. Data Priv. 4(1): 19-30 (2011) - [c75]Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
Assembling Metadata for Database Forensics. IFIP Int. Conf. Digital Forensics 2011: 89-99 - [c74]Mark-Anthony Fouche, Martin S. Olivier:
Steganographic Techniques for Hiding Data in SWF Files. IFIP Int. Conf. Digital Forensics 2011: 245-255 - [c73]Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool. ISSA 2011 - [c72]Ivan Daniel Burke, Martin S. Olivier:
Analysing the fairness of trust-based Mobile Ad Hoc Network protocols. ISSA 2011 - [c71]Waldo Delport, Michael Köhn, Martin S. Olivier:
Isolating a cloud instance for a digital forensic investigation. ISSA 2011 - [c70]Anastassia S. Rakitianskaia, Martin S. Olivier, Antony K. Cooper:
Nature and Forensic investigation of crime in Second Life. ISSA 2011 - [c69]Tinus Strauss, Martin S. Olivier:
Network Forensics in a Clean-Slate Internet Architecture. ISSA 2011 - [c68]Mark-Anthony Fouche, Martin S. Olivier:
Detecting non-stereoscopic to stereoscopic image splicing with the use of disparity maps. SAICSIT 2011: 271-274 - [c67]Madeleine Adrienne Bihina Bella, Martin Olivier, Jan H. P. Eloff:
Proposing a Digital Operational Forensic Investigation Process . WDFIA 2011: 17-32 - 2010
- [j22]Neil J. Croft, Martin S. Olivier:
Sequenced release of privacy-accurate information in a forensic investigation. Digit. Investig. 7(1-2): 95-101 (2010) - [j21]Marek P. Zielinski, Martin S. Olivier:
On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation. Data Knowl. Eng. 69(5): 399-423 (2010) - [c66]Hendrik Visage, Martin S. Olivier:
A Generalized model for understanding and education of Information and Computer Security. ISSA 2010 - [c65]Wesley Brandi, Martin S. Olivier:
In Search of Search Privacy. TrustBus 2010: 102-116
2000 – 2009
- 2009
- [j20]Martin S. Olivier:
On metadata context in Database Forensics. Digit. Investig. 5(3-4): 115-123 (2009) - [c64]Hendrik J. G. Oberholzer, Martin S. Olivier:
Emergency Privacy Measures. CSE (3) 2009: 324-329 - [c63]Innocentia Dlamini, Martin S. Olivier, Sihle Sibiya:
Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling. DEXA Workshops 2009: 145-149 - [c62]Marek P. Zielinski, Martin S. Olivier:
How Appropriate is K-Anonymity for Addressing the Conflict Between Privacy and Information Utility in Microdata ASnonymisation. ISSA 2009: 171-188 - [c61]Innocentia Dlamini, Martin S. Olivier:
The Design of a Logical Traffic Isolation Forensic Model. ISSA 2009: 407-418 - [c60]Innocentia Zamaswazi Dlamini, Martin Olivier, Marthie Grobler:
A Simulation of Logical Traffic Isolation Using Differentiated Services. WDFIA 2009: 20-32 - [c59]Kweku Kwakye Arthur, Martin S. Olivier:
Processing Algorithms for Components within a Forensic Evidence Management System. WDFIA 2009: 53-62 - [c58]Dirk Kotze, Martin S. Olivier:
XBRL-Trail --- A model for introducing digital forensic readiness to XBRL. WDFIA 2009: 93-104 - 2008
- [j19]Tinus Strauss, Derrick G. Kourie, Martin S. Olivier:
A comparison of simulated traffic conditioner performance. Comput. Commun. 31(17): 3933-3940 (2008) - [j18]Heiko Tillwick, Martin S. Olivier:
Bridging the gap between anonymous e-mail and anonymous web browsing. Online Inf. Rev. 32(1): 22-34 (2008) - [j17]Martin S. Olivier:
On the probability of a false positive match for digital camera identification based on sensor dirt location. South Afr. Comput. J. 41: 21-28 (2008) - [c57]Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393 - [c56]Martin S. Olivier:
Using Sensor Dirt for Toolmark Analysis of Digital Photographs. IFIP Int. Conf. Digital Forensics 2008: 193-206 - [c55]Renico Koen, Martin S. Olivier:
An Evidence Acquisition Tool for Live Systems. IFIP Int. Conf. Digital Forensics 2008: 325-334 - [c54]Renico Koen, Martin S. Olivier:
The Use of File Timestamps in Digital Forensics. ISSA 2008: 1-16 - [c53]Michael Köhn, Jan H. P. Eloff, Martin S. Olivier:
UML Modelling of Digital Forensic Process Models (DFPMs). ISSA 2008: 1-13 - [c52]Pontjho Mokhonoana, Martin S. Olivier:
Application of Message Digests for the Verification of Logical Forensic Data. ISSA 2008: 1-11 - [c51]Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie:
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. PST 2008: 56-64 - [c50]Wesley Brandi, Martin S. Olivier, Alf Zugenmaier:
Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. TrustBus 2008: 195-204 - 2007
- [c49]Dirk Kotze, Martin S. Olivier:
Patlet for Digital Forensics First Responders. DEXA Workshops 2007: 770-774 - [c48]Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter:
Applying The Biba Integrity Model to Evidence Management. IFIP Int. Conf. Digital Forensics 2007: 317-327 - [c47]Wynand van Staden, Martin S. Olivier:
SQL's revoke with a view on privacy. SAICSIT 2007: 181-188 - [c46]Wynand van Staden, Martin S. Olivier:
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. TrustBus 2007: 201-209 - 2006
- [j16]Hendrik J. G. Oberholzer, Martin S. Olivier:
Privacy contracts incorporated in a privacy protection framework. Comput. Syst. Sci. Eng. 21(1) (2006) - [j15]Wesley Brandi, Martin S. Olivier:
Exposing anonymous network participants via an external attack. South Afr. Comput. J. 37: 12-18 (2006) - [c45]Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier:
Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65 - [c44]Marco Slaviero, Anna Granova, Martin S. Olivier:
Active Traffic Capture for Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 215-228 - [c43]Tinus Strauss, Martin S. Olivier, Derrick G. Kourie:
Logical Traffic Isolation Using Differentiated Services. IFIP Int. Conf. Digital Forensics 2006: 229-237 - [c42]Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter:
Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258 - [c41]Wesley Brandi, Martin S. Olivier:
On bidder zones, cell phones and ballot stuffing. ISSA 2006: 1-11 - [c40]Neil J. Croft, Martin S. Olivier:
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. ISSA 2006: 1-14 - [c39]Michael Köhn, Martin S. Olivier, Jan H. P. Eloff:
Framework for a Digital Forensic Investigation. ISSA 2006: 1-7 - [c38]Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier:
Using Image Steganography for Decryptor Distribution. OTM Workshops (1) 2006: 322-330 - [c37]Wesley Brandi, Martin S. Olivier:
Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. TrustBus 2006: 81-90 - [c36]Wynand van Staden, Martin S. Olivier:
Extending SQL to Allow the Active Usage of Purposes. TrustBus 2006: 123-131 - [c35]Thorsten Neumann, Heiko Tillwick, Martin S. Olivier:
Information Leakage in Ubiquitous Voice-over-IP Communications. TrustBus 2006: 233-242 - [e2]Martin S. Olivier, Sujeet Shenoi:
Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006. IFIP Advances in Information and Communication Technology 222, Springer 2006, ISBN 978-0-387-36890-0 [contents] - 2005
- [j14]Martin S. Olivier:
Flocks : distributed proxies for browsing privacy. South Afr. Comput. J. 34: 33-40 (2005) - [c34]Hendrik J. G. Oberholzer, Martin S. Olivier:
Privacy Contracts as an Extension of Privacy Policies. ICDE Workshops 2005: 1192 - [c33]Martin S. Olivier:
Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. IFIP Int. Conf. Digital Forensics 2005: 17-31 - [c32]Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter:
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112 - [c31]Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier:
Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123 - [c30]Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier:
An overview of image steganography. ISSA 2005: 1-11 - [c29]Marco Slaviero, Jaco Kroon, Martin S. Olivier:
Attacking Signed Binaries. ISSA 2005: 1-10 - 2004
- [j13]Hein S. Venter, Martin S. Olivier, Jan H. P. Eloff:
PIDS: a privacy intrusion detection system. Internet Res. 14(5): 360-365 (2004) - [j12]Martin S. Olivier:
Using organisational safeguards to make justifiable privacy decisions when processing personal data. South Afr. Comput. J. 33: 77-87 (2004) - 2003
- [j11]Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in Using Databases. J. Comput. Secur. 11(3): 353-364 (2003) - [j10]Martin S. Olivier:
A layered architecture for privacy - enhancing technologies. South Afr. Comput. J. 31: 53-61 (2003) - [c28]Martin S. Olivier:
Privacy under Conditions of Concurrent Interaction with Multiple Parties. DBSec 2003: 105-118 - 2002
- [j9]Martin S. Olivier, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. Data Knowl. Eng. 43(3): 281-292 (2002) - [j8]Wesley Brandi, Martin S. Olivier:
Maintaining Integrity within Mobile Self Protecting Objects. Informatica (Slovenia) 26(2) (2002) - [j7]Frans A. Lategan, Martin S. Olivier:
PrivGuard : a model to protect private information based on its usage. South Afr. Comput. J. 29: 58-68 (2002) - [j6]Martin S. Olivier:
Database Privacy. SIGKDD Explor. 4(2): 20-27 (2002) - [c27]Frans A. Lategan, Martin S. Olivier:
A Chinese Wall Approach to Privacy Policies for the Web. COMPSAC 2002: 940-944 - [c26]Lucas C. J. Dreyer, Martin S. Olivier:
Implementing Workflow Systems. DBSec 2002: 61-72 - [c25]David W. Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani Thuraisingham:
Privacy and Civil Liberties. DBSec 2002: 331-346 - [e1]Martin S. Olivier, David L. Spooner:
Database and Application Security XV, IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. IFIP Conference Proceedings 215, Kluwer 2002, ISBN 1-4020-7041-1 [contents] - 2001
- [j5]Martin S. Olivier:
Towards a configurable security architecture. Data Knowl. Eng. 38(2): 121-145 (2001) - [j4]Adéle Martins, Nico Martins, Martin S. Olivier:
Consumer perception of electronic-commerce. South Afr. Comput. J. 27: 27-33 (2001) - [c24]Alexandre Hardy, Martin S. Olivier:
A Comparison Between ConSA and Current Linux Security Implementations. DBSec 2001: 211-224 - [c23]David L. Spooner, Martin S. Olivier:
Selected Summary of Discussions. DBSec 2001: 325-335 - [c22]Wesley Brandi, Martin S. Olivier:
Maintaining Integrity within Mobile Self Protecting Objects. Conference on Information Security Management & Small Systems Security 2001: 45-56 - [c21]Frans A. Lategan, Martin S. Olivier:
On granting limited access to private information. WWW 2001: 21-25 - 2000
- [c20]Alexandre Hardy, Martin S. Olivier:
A Configurable Security Architecture Prototype. DBSec 2000: 51-62 - [c19]Martin S. Olivier, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160 - [c18]Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in using Databases. DBSec 2000: 271-282 - [c17]Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban:
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. DEXA 2000: 287-301 - [c16]Frans A. Lategan, Martin S. Olivier:
Enforcing Privacy by Withholding Private Information. SEC 2000: 421-430
1990 – 1999
- 1999
- [j3]Ehud Gudes, Martin S. Olivier, Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace. J. Comput. Secur. 7(4): 287-315 (1999) - 1998
- [c15]Lucas C. J. Dreyer, Martin S. Olivier:
A Workbench for Privacy Policies. COMPSAC 1998: 350-355 - [c14]Lucas C. J. Dreyer, Martin S. Olivier:
An Information-Flow for Privacy (InfoPriv). DBSec 1998: 77-90 - [c13]Ehud Gudes, Martin S. Olivier:
Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107 - [c12]Bhavani Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier:
Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284 - [c11]Lucas C. J. Dreyer, Martin S. Olivier:
Dynamic Aspects of the InfoPriv Model for Information Privacy. DEXA Workshop 1998: 340-345 - [c10]Martin S. Olivier, Reind P. van de Riet, Ehud Gudes:
Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351 - 1997
- [c9]Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195 - 1996
- [c8]Martin S. Olivier:
Using Workflow to Enhance Security in Federated Databases. Communications and Multimedia Security 1996: 60-71 - [c7]Paul M. Boshoff, Martin S. Olivier:
Increasing Firewall Reliability by Recording Routes. Communications and Multimedia Security 1996: 303-314 - [c6]Martin S. Olivier:
Integrity Constraints in Federated Databases. DBSec 1996: 43-57 - [c5]Martin S. Olivier:
Supporting Site Security Policies for Members of Federated Databases. ECIS 1996: 45-56 - [c4]Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms:
MoFAC: a model for fine-grained access control. SEC 1996: 295-305 - 1995
- [c3]Martin S. Olivier:
Self-protecting Objects in a Secure Federated Database. DBSec 1995: 27-42 - 1994
- [j2]Martin S. Olivier, Sebastiaan H. von Solms:
A Taxonomy for Secure Object-Oriented Databases. ACM Trans. Database Syst. 19(1): 3-46 (1994) - [c2]Martin S. Olivier:
A Multilevel Secure Federated Database. DBSec 1994: 183-198 - 1992
- [j1]Martin S. Olivier, Sebastiaan H. von Solms:
Building a secure database using self-protecting objects. Comput. Secur. 11(3): 259-271 (1992) - [c1]Martin S. Olivier, Sebastiaan H. von Solms:
DISCO - A Discretionary Security Model for Object-oriented Databases. SEC 1992: 345-357
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint