@article { olivier2003,title = {WorkFlow analyzed for security and privacy in using databases},journal = {Journal of Computer Security},year = {2003},volume = {11},number = {3},pages = {353-363},author = {Teepe, W. and Van De Riet, R. and Olivier, M.}}
2003
A Layered Architecture for Privacy-enhancing Technologies
@incollection{Hardy_2002,doi = {10.1007/978-0-387-35587-0_15},url = {http://dx.doi.org/10.1007/978-0-387-35587-0_15},year = 2002,publisher = {Springer Science $\mathplus$ Business Media},pages = {211--224},author = {Alexandre Hardy and Martin S. Olivier},title = {A Comparison Between {ConSA} and Current Linux Security Implementations},booktitle = {Database and Application Security {XV}}}