@incollection{Dreyer_1999,doi = {10.1007/978-0-387-35564-1_5},url = {http://dx.doi.org/10.1007/978-0-387-35564-1_5},year = 1999,publisher = {Springer Science $\mathplus$ Business Media},pages = {77--90},author = {Lucas C. J. Dreyer and Martin S. Olivier},title = {An Information-Flow Model for Privacy (Infopriv)},booktitle = {Database Security {XII}}}
1999
Modelling, specifying and implementing workflow security in cyberspace
@article { olivier1999,title = {Modelling, specifying and implementing workflow security in cyberspace},journal = {Journal of Computer Security},year = {1999},volume = {7},number = {4},pages = {287-315},author = {Gudes, E. and Olivier, M.S. and Van De Riet, R.P.}}
1999
Security Policies in Replicated and Autonomous Databases
@incollection{Thuraisingham_1999,doi = {10.1007/978-0-387-35564-1_17},url = {http://dx.doi.org/10.1007/978-0-387-35564-1_17},year = 1999,publisher = {Springer Science $\mathplus$ Business Media},pages = {269--284},author = {Bhavani Thuraisingham and Sushil Jajodia and Pierangela Samarati and John Dobson and Martin Olivier},title = {Security and Privacy Issues for the World Wide Web: Panel Discussion},booktitle = {Database Security {XII}}}
1998
Data Packet Intercepting on the Internet: How and Why? A Closer Look at Existing Data Packet-Intercepting Tools
@article{Venter1998,title = {Data Packet Intercepting on the Internet: How and Why? A Closer Look at Existing Data Packet-Intercepting Tools},journal = {Computers and Security},year = {1998},volume = {17},number = {8},pages = {683-692},author = {Venter, H.S. and Eloff, J.H.P.}}