Martin S. Olivier
Orcid: 0000-0002-5030-6134Affiliations:
- University of Pretoria, South Africa
According to our database1,
Martin S. Olivier
authored at least 137 papers
between 1992 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on mo.co.za
-
on dl.acm.org
On csauthors.net:
Bibliography
2020
Proceedings of the Advances in Digital Forensics XVI, 2020
2019
Int. J. Electron. Secur. Digit. Forensics, 2019
Proceedings of the Advances in Digital Forensics XV, 2019
2018
Digit. Investig., 2018
Proceedings of the Information Security - 17th International Conference, 2018
2017
Proceedings of the 2017 Information Security for South Africa, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
2016
Proceedings of the Advances in Digital Forensics XII, 2016
Proceedings of the Computer Science Education Research Conference 2016, 2016
2015
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
2014
Proceedings of the Reflections on the History of Computers in Education, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the Advances in Digital Forensics X, 2014
2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
2012
Using time-driven activity-based costing to manage digital forensic readiness in large organisations.
Inf. Syst. Frontiers, 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012
2011
Trans. Data Priv., 2011
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities.
South Afr. Comput. J., 2011
J. Univers. Comput. Sci., 2011
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Detecting non-stereoscopic to stereoscopic image splicing with the use of disparity maps.
Proceedings of the 2011 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool.
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
2010
On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation.
Data Knowl. Eng., 2010
Digit. Investig., 2010
A Generalized model for understanding and education of Information and Computer Security.
Proceedings of the Information Security South Africa Conference 2010, 2010
2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
How Appropriate is K-Anonymity for Addressing the Conflict Between Privacy and Information Utility in Microdata ASnonymisation.
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
On the probability of a false positive match for digital camera identification based on sensor dirt location.
South Afr. Comput. J., 2008
Online Inf. Rev., 2008
Proceedings of the Trust, 2008
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Trust, 2007
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007
Proceedings of the Advances in Digital Forensics III, 2007
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
2006
South Afr. Comput. J., 2006
Privacy contracts incorporated in a privacy protection framework.
Comput. Syst. Sci. Eng., 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks.
Proceedings of the Advances in Digital Forensics, 2005
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
2004
Using organisational safeguards to make justifiable privacy decisions when processing personal data.
South Afr. Comput. J., 2004
2003
South Afr. Comput. J., 2003
J. Comput. Secur., 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
South Afr. Comput. J., 2002
Maintaining Integrity within Mobile Self Protecting Objects.
Informatica (Slovenia), 2002
Data Knowl. Eng., 2002
Implementing Workflow Systems.
Proceedings of the Research Directions in Data and Applications Security, 2002
Privacy and Civil Liberties.
Proceedings of the Research Directions in Data and Applications Security, 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
Proceedings of the Tenth International World Wide Web Conference, 2001
Selected Summary of Discussions.
Proceedings of the Database and Application Security XV, 2001
A Comparison Between ConSA and Current Linux Security Implementations.
Proceedings of the Database and Application Security XV, 2001
2000
Enforcing Privacy by Withholding Private Information.
Proceedings of the Information Security for Global Information Infrastructures, 2000
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000
Proceedings of the Data and Application Security, 2000
1999
J. Comput. Secur., 1999
1998
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998
Security Policies in Replicated and Autonomous Databases.
Proceedings of the Database Security XII: Status and Prospects, 1998
An Information-Flow for Privacy (InfoPriv).
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
MoFAC: a model for fine-grained access control.
Proceedings of the Information Systems Security, 1996
Supporting Site Security Policies for Members of Federated Databases.
Proceedings of the Fourth European Conference on Information Systems, 1996
Integrity Constraints in Federated Databases.
Proceedings of the Database Security Volume X, 1996
Using Workflow to Enhance Security in Federated Databases.
Proceedings of the Communications and Multimedia Security II, 1996
Increasing Firewall Reliability by Recording Routes.
Proceedings of the Communications and Multimedia Security II, 1996
1995
Self-protecting Objects in a Secure Federated Database.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
A Multilevel Secure Federated Database.
Proceedings of the Database Security, 1994
1992
DISCO - A Discretionary Security Model for Object-oriented Databases.
Proceedings of the IT Security: The Need for International Cooperation, 1992