@article { olivier1999,title = {Modelling, specifying and implementing workflow security in cyberspace},journal = {Journal of Computer Security},year = {1999},volume = {7},number = {4},pages = {287-315},author = {Gudes, E. and Olivier, M.S. and Van De Riet, R.P.}}
1999
Security Policies in Replicated and Autonomous Databases
@incollection{Thuraisingham_1999,doi = {10.1007/978-0-387-35564-1_17},url = {http://dx.doi.org/10.1007/978-0-387-35564-1_17},year = 1999,publisher = {Springer Science $\mathplus$ Business Media},pages = {269--284},author = {Bhavani Thuraisingham and Sushil Jajodia and Pierangela Samarati and John Dobson and Martin Olivier},title = {Security and Privacy Issues for the World Wide Web: Panel Discussion},booktitle = {Database Security {XII}}}
1998
Data Packet Intercepting on the Internet: How and Why? A Closer Look at Existing Data Packet-Intercepting Tools
@article{Venter1998,title = {Data Packet Intercepting on the Internet: How and Why? A Closer Look at Existing Data Packet-Intercepting Tools},journal = {Computers and Security},year = {1998},volume = {17},number = {8},pages = {683-692},author = {Venter, H.S. and Eloff, J.H.P.}}
1998
Data packet intercepting on the Internet: How and why? A closer look at existing data packet-intercepting tools
@article{RID:0814170417408-52,
title = {Data packet intercepting on the Internet: How and why? A closer look at existing data packet-intercepting tools},
journal = {Computers & Security},
year = {1998},
author = {Venter, HS and Eloff, JHP},
volume = {17},
number = {8},
pages = {683-692}
}