2009 | ||
---|---|---|
83 | Ehud Gudes, Jaideep Vaidya: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings Springer 2009 | |
82 | Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein: Methods for Computing Trust and Reputation While Preserving Privacy. DBSec 2009: 291-298 | |
81 | Boris Rozenberg, Ehud Gudes, Yuval Elovici: SISR - A New Model for Epidemic Spreading of Electronic Threats. ISC 2009: 242-249 | |
80 | Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel: Method for Detecting Unknown Malicious Executables. RAID 2009: 376-377 | |
79 | Tal Grinshpoun, Nurit Gal-Oz, Amnon Meisels, Ehud Gudes: CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities. Web Intelligence 2009: 34-41 | |
78 | Vladimir Lipets, Natalia Vanetik, Ehud Gudes: Subsea: an efficient heuristic algorithm for subgraph isomorphism. Data Min. Knowl. Discov. 19(3): 320-350 (2009) | |
2008 | ||
77 | Alex Roichman, Ehud Gudes: DIWeDa - Detecting Intrusions in Web Databases. DBSec 2008: 313-329 | |
76 | Yosef Shatsky, Ehud Gudes: TOPS: a new design for transactions in publish/subscribe middleware. DEBS 2008: 201-210 | |
75 | Boris Rozenberg, Ehud Gudes, Yuval Elovici: A Distributed Framework for the Detection of New Worm-Related Malware. EuroISI 2008: 179-190 | |
2007 | ||
74 | Luis Vargas, Lauri I. W. Pesonen, Ehud Gudes, Jean Bacon: Transactions in Content-Based Publish/Subscribe Middleware. ICDCS Workshops 2007: 68 | |
73 | Alex Roichman, Ehud Gudes: Fine-grained access control to web databases. SACMAT 2007: 31-40 | |
2006 | ||
72 | Noa Tuval, Ehud Gudes: Resolving Information Flow Conflicts in RBAC Systems. DBSec 2006: 148-162 | |
71 | Alex Gurevich, Ehud Gudes: Recent Research on Privacy Preserving Data Mining. ICISS 2006: 377-380 | |
70 | Alex Gurevich, Ehud Gudes: Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. IDEAS 2006: 121-128 | |
69 | Boris Rozenberg, Ehud Gudes: Association rules mining in vertically partitioned databases. Data Knowl. Eng. 59(2): 378-396 (2006) | |
68 | Natalia Vanetik, Solomon Eyal Shimony, Ehud Gudes: Support measures for graph data. Data Min. Knowl. Discov. 13(2): 243-260 (2006) | |
67 | Ehud Gudes, Solomon Eyal Shimony, Natalia Vanetik: Discovering Frequent Graph Patterns Using Disjoint Paths. IEEE Trans. Knowl. Data Eng. 18(11): 1441-1456 (2006) | |
2005 | ||
66 | Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes: Designing Secure Indexes for Encrypted Databases. DBSec 2005: 54-68 | |
65 | Ehud Gudes, Alexander Pertsev: Mining Module for Adaptive XML Path Indexing. DEXA Workshops 2005: 1015-1019 | |
64 | Paz Biber, Ehud Gudes: Using Relevant Sets for Optimizing XML Indexes. WEBIST 2005: 13-23 | |
2004 | ||
63 | Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce: Information Flow Analysis for File Systems and Databases Using Labels. DBSec 2004: 125-141 | |
62 | Moti Cohen, Ehud Gudes: Diagonally Subgraphs Pattern Mining. DMKD 2004: 51-58 | |
61 | Natalia Vanetik, Ehud Gudes: Mining Frequent Labeled and Partially Labeled Graph Patterns. ICDE 2004: 91-102 | |
60 | Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels: A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. ICICS 2004: 171-186 | |
59 | Lev-Arie Ratinov, Solomon Eyal Shimony, Ehud Gudes: Probabilistic model for schema understanding and matching. SMC (5) 2004: 4768-4773 | |
58 | Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes: A Structure Preserving Database Encryption Scheme. Secure Data Management 2004: 28-40 | |
57 | Lev-Arie Ratinov, Ehud Gudes: Abbreviation Expansion in Schema Matching and Web Integration. Web Intelligence 2004: 485-489 | |
2003 | ||
56 | Ehud Gudes, Sujeet Shenoi: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK Kluwer 2003 | |
55 | Ehud Gudes, Boris Rozenberg: Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. DBSec 2003: 91-104 | |
54 | Alexander Binun, Ehud Gudes: Policy and State Based Secure Wrapper and Its Application to Mobile Agents. LA-WEB 2003: 14-26 | |
53 | Rachel Ben-Eliyahu-Zohary, Carmel Domshlak, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony: FlexiMine - A Flexible Platform for KDD Research and Application Development. Ann. Math. Artif. Intell. 39(1-2): 175-204 (2003) | |
52 | Rachel Ben-Eliyahu-Zohary, Ehud Gudes, Giovambattista Ianni: Metaqueries: Semantics, complexity, and efficient algorithms. Artif. Intell. 149(1): 61-87 (2003) | |
2002 | ||
51 | Ehud Gudes, Carmel Domshlak, Natalia Orlov: Remote Conferencing with Multimedia Objects. EDBT Workshops 2002: 526-543 | |
50 | Raghav Kaushik, Pradeep Shenoy, Philip Bohannon, Ehud Gudes: Exploiting Local Similarity for Indexing Paths in Graph-Structured Data. ICDE 2002: 129-140 | |
49 | Natalia Vanetik, Ehud Gudes, Solomon Eyal Shimony: Computing Frequent Graph Patterns from Semistructured Data. ICDM 2002: 458-465 | |
48 | Mira Balaban, Nikolai Berezansky, Ehud Gudes: Answering Cooperative Recursive Queries in Web Federated Databases. NGITS 2002: 14-28 | |
47 | Ehud Gudes, Aharon Tubman: AutoWF - A secure Web workflow system using autonomous objects. Data Knowl. Eng. 43(1): 1-27 (2002) | |
46 | Martin S. Olivier, Ehud Gudes: Wrappers - a mechanism to support state-based authorisation in Web applications. Data Knowl. Eng. 43(3): 281-292 (2002) | |
2000 | ||
45 | Martin S. Olivier, Ehud Gudes: Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160 | |
44 | Rachel Ben-Eliyahu-Zohary, Ehud Gudes: Meta-queries - Computation and Evaluation. DaWaK 2000: 265-275 | |
1999 | ||
43 | Rachel Ben-Eliyahu-Zohary, Ehud Gudes: Towards Efficient Metaquerying. IJCAI 1999: 800-805 | |
42 | Amir Sapir, Ehud Gudes: Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases. NGITS 1999: 94-111 | |
41 | Ehud Gudes, Martin S. Olivier, Reind P. van de Riet: Modeling, Specifying and Implementing Workflow Security in Cyberspace. Journal of Computer Security 7(4): (1999) | |
40 | Natalija Krivokapic, Alfons Kemper, Ehud Gudes: Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis. VLDB J. 8(2): 79-100 (1999) | |
1998 | ||
39 | Ehud Gudes, Martin S. Olivier: Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107 | |
38 | Martin S. Olivier, Reind P. van de Riet, Ehud Gudes: Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351 | |
37 | Amir Sapir, Ehud Gudes: Dynamic Relationships and their Propagation Attributes in Object Oriented Databases. DEXA Workshop 1998: 967-974 | |
36 | Carmel Domshlak, D. Gershkovich, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony: FlexiMine - A Flexible Platform for KDD Research and Application Construction. KDD 1998: 184-188 | |
1997 | ||
35 | Masha Gendler-Fishman, Ehud Gudes: Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. DBSec 1997: 110-133 | |
34 | Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier: Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195 | |
33 | Masha Gendler-Fishman, Ehud Gudes: A compile-time model for safe information flow in object-oriented databases. SEC 1997: 41-55 | |
32 | Amnon Meisels, Jihad El-Sana, Ehud Gudes: Decomposing and Solving Timetabling Constraint Networks. Computational Intelligence 13(4): 486-505 (1997) | |
31 | Reind P. van de Riet, Andrea Junk, Ehud Gudes: Security in Cyberspace: A Knowledge-Base Approach. Data Knowl. Eng. 24(1): 69-96 (1997) | |
30 | Ehud Gudes: A Uniform Indexing Scheme for Object-Oriented Databases. Inf. Syst. 22(4): 199-221 (1997) | |
1996 | ||
29 | Gadi Solotorevsky, Ehud Gudes: Algorithms for Solving Distributed Constraint Satisfaction Problems (DCSPs). AIPS 1996: 191-198 | |
28 | Gadi Solotorevsky, Ehud Gudes, Amnon Meisels: Modeling and Solving Distributed Constraint Satisfaction Problems (DCSPs). CP 1996: 561-562 | |
27 | Reind P. van de Riet, Ehud Gudes: An Object-Oriented Database Architecture for Providing Securty in Cyberspace. DBSec 1996: 120-144 | |
26 | Ehud Gudes: A Uniform Indexing Scheme for Object-Oriented Databases. ICDE 1996: 238-246 | |
1995 | ||
25 | G. Trzewik, Ehud Gudes, Amnon Meisels, Gadi Solotorevsky: TRAPS - A Time Dependent Resource Allocation Language. NGITS 1995: 0- | |
24 | Amnon Meisels, Ehud Gudes, Gadi Solotorevsky: Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach. PATAT 1995: 93-105 | |
1994 | ||
23 | Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994) | |
22 | Gadi Solotorevsky, Ehud Gudes, Amnon Meisels: RAPS: A Rule-Based Language for Specifying Resource Allocation and Time-Tabling. IEEE Trans. Knowl. Data Eng. 6(5): 681-697 (1994) | |
1993 | ||
21 | Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes: A Method-Based Authorization Model for Object-Oriented Databases. Security for Object-Oriented Systems 1993: 135-150 | |
20 | Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernández: A Model of Methods Access Authorization in Object-oriented Databases. VLDB 1993: 52-61 | |
1991 | ||
19 | Amnon Meisels, Tsvi Kuflik, Ehud Gudes: Limited-resource scheduling by generalized rule-based system. Knowl.-Based Syst. 4(4): 215-224 (1991) | |
1990 | ||
18 | Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98 | |
17 | Ehud Gudes, Tsvi Kuflik, Amnon Meisels: An Expert Systems Based Methodology for Solving Resource Allocation Problems. IEA/AIE (Vol. 1) 1990: 309-317 | |
1989 | ||
16 | María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Security Policies in Object-Oriented Databases. DBSec 1989: 257-268 | |
15 | Ehud Reches, Ehud Gudes, Ehud Y. Shapiro: A Distributed Locking Algorithm for A Transactions System in Flat Concurrent Prolog. FODO 1989: 304-319 | |
14 | Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Security Model for Object-Oriented Databases. IEEE Symposium on Security and Privacy 1989: 110-115 | |
1988 | ||
13 | Peretz Shoval, Ehud Gudes, Moshe Goldstein: GISD: a graphical interactive system for conceptual database design. Inf. Syst. 13(1): 81-95 (1988) | |
1987 | ||
12 | Ehud Gudes, Gilad Bracha: GCI-A Tool for Developing Interactive CAD User Interfaces. Softw., Pract. Exper. 17(11): 783-799 (1987) | |
1984 | ||
11 | David L. Spooner, Ehud Gudes: A Unifying Approach to the Design of a Secure Database Operating System. IEEE Trans. Software Eng. 10(3): 310-319 (1984) | |
1982 | ||
10 | Prabuddha De, Arun Sen, Ehud Gudes: A new model for data base abstraction. Inf. Syst. 7(1): 1-12 (1982) | |
1981 | ||
9 | Prabuddha De, Arun Sen, Ehud Gudes: An Extended Entity-Relationship Model with Multi Level External Views. ER 1981: 455-472 | |
1980 | ||
8 | Ehud Gudes, Shalom Tsur: Experiments with B-Tree Reorganization. SIGMOD Conference 1980: 200-206 | |
7 | Ehud Gudes: The Design of a Cryptopgraphy Based Secure File System. IEEE Trans. Software Eng. 6(5): 411-420 (1980) | |
1979 | ||
6 | Ehud Gudes, Anthony Hoffman: A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System". Commun. ACM 22(10): 550-553 (1979) | |
5 | Ehud Gudes, Harvey S. Koch, Fred A. Stahl: Security in a Multi-Level Structured Model of a Data Base. Comput. J. 22(4): 303-306 (1979) | |
1978 | ||
4 | Johann P. Malmquist, Ehud Gudes, Edward L. Robertson: Storage Allocation for Access Path Minimization in Network Structured Data Bases. JCDKB 1978: 319- | |
1977 | ||
3 | Ehud Gudes: Teaching data base systems using Date and Computing Surveys. SIGMOD Record 9(1): 47-49 (1977) | |
1976 | ||
2 | Ehud Gudes, Harvey S. Koch, Fred A. Stahl: The application of cryptography for data base security. AFIPS National Computer Conference 1976: 97-107 | |
1973 | ||
1 | Ehud Gudes, A. Reiter: On Evaluating Boolean Expressions. Softw., Pract. Exper. 3(4): 345-350 (1973) |