@incollection{van_de_Riet_2000,doi = {10.1007/3-540-44469-6_27},url = {http://dx.doi.org/10.1007/3-540-44469-6_27},year = 2000,publisher = {Springer Science $\mathplus$ Business Media},pages = {287--302},author = {Reind van de Riet and Wouter Janssen and Martin Olivier and Radu Serban},title = {A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace},booktitle = {Lecture Notes in Computer Science}}
2000
Enforcing Privacy by Withholding Private Information
@incollection{Lategan_2000,doi = {10.1007/978-0-387-35515-3_43},url = {http://dx.doi.org/10.1007/978-0-387-35515-3_43},year = 2000,publisher = {Springer Science $\mathplus$ Business Media},pages = {421--430},author = {Frans Lategan and Martin S. Olivier},title = {Enforcing Privacy by Withholding Private Information},booktitle = {Information Security for Global Information Infrastructures}}
2000
A comparison of two architectures for implementing security and privacy in cyberspace
@article{Olivier2000,title = {A comparison of two architectures for implementing security and privacy in cyberspace},journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},year = {2000},volume = {1873},pages = {287-302},author = {van de Riet, R.V.D. and Janssen, W. and Olivier, M. and Serban, R.}}
@incollection{Dreyer_1999,doi = {10.1007/978-0-387-35564-1_5},url = {http://dx.doi.org/10.1007/978-0-387-35564-1_5},year = 1999,publisher = {Springer Science $\mathplus$ Business Media},pages = {77--90},author = {Lucas C. J. Dreyer and Martin S. Olivier},title = {An Information-Flow Model for Privacy (Infopriv)},booktitle = {Database Security {XII}}}