@article { olivier2008,title = {An evidence acquisition tool for live systems},journal = {IFIP International Federation for Information Processing},year = {2008},volume = {285},pages = {325-334},author = {Koen, R. and Olivier, M.}}
2008
Bridging the gap between anonymous e-mail and anonymous web browsing
@article { olivier2008,title = {Bridging the gap between anonymous e-mail and anonymous web browsing},journal = {Online Information Review},year = {2008},volume = {32},number = {1},pages = {22-34},author = {Tillwick, H. and Olivier, M.S.}}
2008
Preservation of privacy in thwarting the ballot stuffing scheme
@article { olivier2008,title = {Preservation of privacy in thwarting the ballot stuffing scheme},journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},year = {2008},volume = {5185 LNCS},pages = {195-204},author = {Brandi, W. and Olivier, M.S. and Zugenmaier, A.}}
2008
Toward a model of responsibility for proactive systems
@article { olivier2008,title = {Toward a model of responsibility for proactive systems},journal = {Journal of Information Ethics},year = {2008},volume = {17},number = {2},pages = {78-90},author = {Venter, S.L. and Olivier, M.S. and Britz, J.J.}}
2008
Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy
@article { olivier2008,title = {Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy},journal = {Proceedings - 6th Annual Conference on Privacy, Security and Trust, PST 2008},year = {2008},pages = {56-64},author = {Reddy, K. and Venter, H.S. and Olivier, M. and Currie, I.}}