@incollection{Lategan_2000,doi = {10.1007/978-0-387-35515-3_43},url = {http://dx.doi.org/10.1007/978-0-387-35515-3_43},year = 2000,publisher = {Springer Science $\mathplus$ Business Media},pages = {421--430},author = {Frans Lategan and Martin S. Olivier},title = {Enforcing Privacy by Withholding Private Information},booktitle = {Information Security for Global Information Infrastructures}}
2000
A comparison of two architectures for implementing security and privacy in cyberspace
@article{Olivier2000,title = {A comparison of two architectures for implementing security and privacy in cyberspace},journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},year = {2000},volume = {1873},pages = {287-302},author = {van de Riet, R.V.D. and Janssen, W. and Olivier, M. and Serban, R.}}
@incollection{Dreyer_1999,doi = {10.1007/978-0-387-35564-1_5},url = {http://dx.doi.org/10.1007/978-0-387-35564-1_5},year = 1999,publisher = {Springer Science $\mathplus$ Business Media},pages = {77--90},author = {Lucas C. J. Dreyer and Martin S. Olivier},title = {An Information-Flow Model for Privacy (Infopriv)},booktitle = {Database Security {XII}}}
1999
Modelling, specifying and implementing workflow security in cyberspace
@article { olivier1999,title = {Modelling, specifying and implementing workflow security in cyberspace},journal = {Journal of Computer Security},year = {1999},volume = {7},number = {4},pages = {287-315},author = {Gudes, E. and Olivier, M.S. and Van De Riet, R.P.}}
1999
Security Policies in Replicated and Autonomous Databases