@incollection{Hardy_2002,doi = {10.1007/978-0-387-35587-0_15},url = {http://dx.doi.org/10.1007/978-0-387-35587-0_15},year = 2002,publisher = {Springer Science $\mathplus$ Business Media},pages = {211--224},author = {Alexandre Hardy and Martin S. Olivier},title = {A Comparison Between {ConSA} and Current Linux Security Implementations},booktitle = {Database and Application Security {XV}}}
@article { olivier2002,title = {Maintaining integrity within mobile self protecting objects},journal = {IFIP Advances in Information and Communication Technology},year = {2002},volume = {72},pages = {45-56},author = {Brandi, W. and Olivier, M.S.}}
@incollection{Spooner_2002,doi = {10.1007/978-0-387-35587-0_23},url = {http://dx.doi.org/10.1007/978-0-387-35587-0_23},year = 2002,publisher = {Springer Science $\mathplus$ Business Media},pages = {325--335},author = {David L. Spooner and Martin S. Olivier},title = {Selected Summary of Discussions},booktitle = {Database and Application Security {XV}}}