default search action
Ehud Gudes
Person information
- affiliation: Ben-Gurion University, Beersheba, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Hannah Yair, Shlomi Dolev, Ehud Gudes:
Automatic Real-Time Platoon Formation Using the Road Graph. SN Comput. Sci. 5(1): 18 (2024) - [j45]Grisha Weintraub, Ehud Gudes, Shlomi Dolev, Jeffrey D. Ullman:
Optimizing Cloud Data Lake Queries With a Balanced Coverage Plan. IEEE Trans. Cloud Comput. 12(1): 84-99 (2024) - 2023
- [j44]Noam Hadar, Grisha Weintraub, Ehud Gudes, Shlomi Dolev, Ohad S. Birk:
GeniePool: genomic database with corresponding annotated samples based on a cloud data lake architecture. Database J. Biol. Databases Curation 2023 (2023) - [c113]Silvie Levy, Ehud Gudes, Danny Hendler:
A Survey of Security Challenges in Automatic Identification System (AIS) Protocol. CSCML 2023: 411-423 - [c112]Grisha Weintraub, Noam Hadar, Ehud Gudes, Shlomi Dolev, Ohad S. Birk:
Analyzing large-scale genomic data with cloud data lakes. SYSTOR 2023: 142 - [e5]Shlomi Dolev, Ehud Gudes, Pascal Paillier:
Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings. Lecture Notes in Computer Science 13914, Springer 2023, ISBN 978-3-031-34670-5 [contents] - 2022
- [j43]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Jeffrey D. Ullman:
Efficient and Privacy Preserving Approximation of Distributed Statistical Queries. IEEE Trans. Big Data 8(5): 1399-1413 (2022) - [c111]Nadav Voloch, Ehud Gudes, Nurit Gal-Oz, Rotem Mitrany, Ofri Shani, Maayan Shoel:
Fake News Detection in Social Networks Using Machine Learning and Trust. CSCML 2022: 180-188 - [c110]Shlomi Dolev, Ehud Gudes, Hannah Yair:
Non-stopping Junctions via Traffic Scheduling. CSCML 2022: 247-258 - [c109]Shlomi Dolev, Ehud Gudes, Erez Segev, Jeffrey D. Ullman, Grisha Weintraub:
BFLUT Bloom Filter for Private Look Up Tables. CSCML 2022: 499-505 - 2021
- [j42]Nadav Voloch, Nurit Gal-Oz, Ehud Gudes:
A Trust based Privacy Providing Model for Online Social Networks. Online Soc. Networks Media 24: 100138 (2021) - [j41]Philip Derbeko, Shlomi Dolev, Ehud Gudes:
Wavelet-based dynamic and privacy-preserving similitude data models for edge computing. Wirel. Networks 27(1): 351-366 (2021) - [c108]Yakov Vainshtein, Ehud Gudes:
Use of Blockchain for Ensuring Data Integrity in Cloud Databases. CSCML 2021: 325-335 - [c107]Nadav Voloch, Ehud Gudes, Nurit Gal-Oz:
Implementing GDPR in Social Networks Using Trust and Context. CSCML 2021: 497-503 - [c106]Adi Swissa, Ehud Gudes:
An ABAC Model with Trust and Gossiping (ABAC-TG) for Online Social Networks. DBSec 2021: 377-392 - [c105]Grisha Weintraub, Ehud Gudes, Shlomi Dolev:
Needle in a haystack queries in cloud data lakes. EDBT/ICDT Workshops 2021 - [c104]Shlomi Dolev, Ehud Gudes, Hannah Yair:
Automatic Real Time Platoon Formation Using the Road Graph. NCA 2021: 1-4 - [c103]Nadav Voloch, Ehud Gudes, Nurit Gal-Oz:
Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model. NSS 2021: 100-115 - [c102]Grisha Weintraub, Ehud Gudes, Shlomi Dolev:
Indexing cloud data lakes within the lakes. SYSTOR 2021: 22:1 - 2020
- [c101]Nadav Voloch, Ehud Gudes, Nurit Gal-Oz:
Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks. COMPLEX NETWORKS (1) 2020: 641-650 - [c100]Eyal Paz, Ehud Gudes:
Comparison of DNS Based Methods for Detecting Malicious Domains. CSCML 2020: 219-236 - [c99]Amir Lukach, Ehud Gudes, Asaf Shabtai:
PUA Detection Based on Bundle Installer Characteristics. DBSec 2020: 261-273
2010 – 2019
- 2019
- [j40]Nurit Gal-Oz, Yaron Gonen, Ehud Gudes:
Mining meaningful and rare roles from web application usage patterns. Comput. Secur. 82: 296-313 (2019) - [j39]Shlomi Dolev, Patricia Florissi, Ehud Gudes, Shantanu Sharma, Ido Singer:
A Survey on Geographically Distributed Big-Data Processing Using MapReduce. IEEE Trans. Big Data 5(1): 60-80 (2019) - [c98]Philip Derbeko, Shlomi Dolev, Ehud Gudes:
Deep Neural Networks as Similitude Models for Sharing Big Data. IEEE BigData 2019: 5728-5736 - [c97]Philip Derbeko, Shlomi Dolev, Ehud Gudes:
MLDStore - DNNs as Similitude Models for Sharing Big Data (Brief Announcement). CSCML 2019: 93-96 - [c96]Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes:
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility. CSCML 2019: 156-168 - [c95]Nadav Voloch, Ehud Gudes:
An MST-based information flow model for security in Online Social Networks. ICUFN 2019: 460-465 - [c94]Nadav Voloch, Priel Nissim, Mor Elmakies, Ehud Gudes:
A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks. IFIPTM 2019: 19-27 - 2018
- [j38]Yaron Gonen, Ehud Gudes, Kirill Kandalov:
New and Efficient Algorithms for Producing Frequent Itemsets with the Map-Reduce Framework. Algorithms 11(12): 194 (2018) - [j37]Silvie Levy, Ehud Gudes, Nurit Gal-Oz:
Sharing-habits based privacy control in social networks. J. Comput. Secur. 26(2): 177-205 (2018) - [c93]Ehud Gudes, Nadav Voloch:
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors. CSCML 2018: 55-67 - [c92]Philip Derbeko, Shlomi Dolev, Ehud Gudes:
Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation. CSCML 2018: 105-119 - [c91]Grisha Weintraub, Ehud Gudes:
Data Integrity Verification in Column-Oriented NoSQL Databases. DBSec 2018: 165-181 - 2017
- [j36]Ishai Rosenberg, Ehud Gudes:
Bypassing system calls-based intrusion detection systems. Concurr. Comput. Pract. Exp. 29(16) (2017) - [c90]Kirill Kandalov, Ehud Gudes:
Incremental Frequent Itemsets Mining with MapReduce. ADBIS 2017: 247-261 - [c89]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Jeffrey D. Ullman:
Efficient and private approximations of distributed databases calculations. IEEE BigData 2017: 4487-4496 - [c88]Grisha Weintraub, Ehud Gudes:
Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud. CCGrid 2017: 498-503 - [c87]Nir Maoz, Ehud Gudes:
Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party. CSCML 2017: 193-195 - [c86]Yossif Shalabi, Ehud Gudes:
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases. DBSec 2017: 3-19 - [c85]Alexey Rabin, Ehud Gudes:
Secure Protocol of ABAC Certificates Revocation and Delegation. FPS 2017: 35-50 - [c84]Hussien Othman, Ehud Gudes, Nurit Gal-Oz:
Advanced Flow Models for Computing the Reputation of Internet Domains. IFIPTM 2017: 119-134 - [i3]Shlomi Dolev, Patricia Florissi, Ehud Gudes, Shantanu Sharma, Ido Singer:
A Survey on Geographically Distributed Big-Data Processing using MapReduce. CoRR abs/1707.01869 (2017) - 2016
- [j35]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma:
Security and privacy aspects in MapReduce on clouds: A survey. Comput. Sci. Rev. 20: 1-28 (2016) - [j34]Michal Davidson, Tamir Tassa, Ehud Gudes:
Content sharing schemes in DRM systems with enhanced performance and privacy preservation. J. Comput. Secur. 24(6): 667-688 (2016) - [c83]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Jeffrey D. Ullman:
Concise essence-preserving big data representation. IEEE BigData 2016: 3662-3665 - [c82]Silvie Levy, Ehud Gudes, Nurit Gal-Oz:
Sharing-Habits Based Privacy Control in Social Networks. DBSec 2016: 217-232 - [c81]Tamir Lavi, Ehud Gudes:
Trust-based Dynamic RBAC. ICISSP 2016: 317-324 - [c80]Ishai Rosenberg, Ehud Gudes:
Evading System-Calls Based Intrusion Detection Systems. NSS 2016: 200-216 - [c79]Yaron Gonen, Ehud Gudes:
An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets. SwSTE 2016: 77-83 - [c78]Ishai Rosenberg, Ehud Gudes:
Attacking and Defending Dynamic Analysis System-Calls Based IDS. WISTP 2016: 103-119 - [i2]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma:
Security and Privacy Aspects in MapReduce on Clouds: A Survey. CoRR abs/1605.00677 (2016) - [i1]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Jeffrey D. Ullman:
Efficient and Private Approximations of Distributed Databases Calculations. CoRR abs/1605.06143 (2016) - 2015
- [c77]Igor Mishsky, Nurit Gal-Oz, Ehud Gudes:
A Topology Based Flow Model for Computing Domain Reputation. DBSec 2015: 277-292 - [c76]Ehud Gudes:
Reputation - from Social Perception to Internet Security. IFIPTM 2015: 3-10 - 2014
- [j33]Rachel Ben-Eliyahu-Zohary, Tal Grinshpoun, Elena Churkin, Ehud Gudes:
Monotonic qualitative logic programs: Computation and applications. AI Commun. 27(3): 213-228 (2014) - [j32]Erez Shmueli, Ronen Vaisenberg, Ehud Gudes, Yuval Elovici:
Implementing a database encryption solution, design and implementation issues. Comput. Secur. 44: 33-50 (2014) - [c75]Michal Davidson, Ehud Gudes, Tamir Tassa:
Efficient and Enhanced Solutions for Content Sharing in DRM Systems. DBSec 2014: 373-381 - [c74]Moshe Unger, Lior Rokach, Ariel Bar, Ehud Gudes, Bracha Shapira:
Contexto: lessons learned from mobile context inference. UbiComp Adjunct 2014: 175-178 - [c73]Igor Mishsky, Nurit Gal-Oz, Ehud Gudes:
Computing domains reputation using flow. ICITST 2014: 426-431 - [c72]Libi Gur, Nurit Gal-Oz, Ehud Gudes:
Knots Maintenance for Optimal Management of Trust Relations. IFIPTM 2014: 189-204 - [e4]Jianying Zhou, Nurit Gal-Oz, Jie Zhang, Ehud Gudes:
Trust Management VIII - 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings. IFIP Advances in Information and Communication Technology 430, Springer 2014, ISBN 978-3-662-43812-1 [contents] - 2013
- [c71]Nurit Gal-Oz, Ehud Gudes:
Trust and reputation in and across virtual communities. EDBT 2013: 769-772 - 2012
- [j31]Tamir Tassa, Ehud Gudes:
Secure distributed computation of anonymized views of shared databases. ACM Trans. Database Syst. 37(2): 11:1-11:43 (2012) - [c70]Rami Sharon, Ehud Gudes:
Code Type Revealing Using Experiments Framework. DBSec 2012: 193-206 - 2011
- [j30]Jaideep Vaidya, Ehud Gudes:
Introduction. J. Comput. Secur. 19(3): 485-486 (2011) - [c69]Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes:
Privacy issues with sharing reputation across virtual communities. PAIS 2011: 3 - [c68]Yaron Gonen, Ehud Gudes:
Users tracking and roles mining in web-based applications. EDBT/ICDT Ph.D. Workshop 2011: 14-18 - [c67]Natalia Vanetik, Ehud Gudes:
HashMax: A New Method for Mining Maximal Frequent Itemsets. KDIR 2011: 140-145 - [c66]Nurit Gal-Oz, Ran Yahalom, Ehud Gudes:
Identifying Knots of Trust in Virtual Communities. IFIPTM 2011: 67-81 - [c65]Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli:
Tracking end-users in web databases. NSS 2011: 105-112 - [c64]Nurit Gal-Oz, Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli:
Mining Roles from Web Application Usage Patterns. TrustBus 2011: 125-137 - [c63]Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
A Method for Detecting Unknown Malicious Executables. TrustCom 2011: 190-196 - [c62]Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov:
Security Issues in NoSQL Databases. TrustCom 2011: 541-547 - [e3]Ian Wakeman, Ehud Gudes, Christian Damsgaard Jensen, Jason Crampton:
Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings. IFIP Advances in Information and Communication Technology 358, Springer 2011, ISBN 978-3-642-22199-6 [contents] - 2010
- [j29]Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes:
Privacy Issues with Sharing and Computing Reputation across Communities. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 16-34 (2010) - [j28]Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes:
Sharing Reputation Across Virtual Communities. J. Theor. Appl. Electron. Commer. Res. 5(2): 1-25 (2010) - [c61]Yaron Gonen, Nurit Gal-Oz, Ran Yahalom, Ehud Gudes:
CAMLS: A Constraint-Based Apriori Algorithm for Mining Long Sequences. DASFAA (1) 2010: 63-77 - [c60]Nurit Gal-Oz, Niv Gilboa, Ehud Gudes:
Schemes for Privately Computing Trust and Reputation. IFIPTM 2010: 1-16
2000 – 2009
- 2009
- [j27]Vladimir Lipets, Natalia Vanetik, Ehud Gudes:
Subsea: an efficient heuristic algorithm for subgraph isomorphism. Data Min. Knowl. Discov. 19(3): 320-350 (2009) - [c59]Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein:
Methods for Computing Trust and Reputation While Preserving Privacy. DBSec 2009: 291-298 - [c58]Boris Rozenberg, Ehud Gudes, Yuval Elovici:
SISR - A New Model for Epidemic Spreading of Electronic Threats. ISC 2009: 242-249 - [c57]Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
Method for Detecting Unknown Malicious Executables. RAID 2009: 376-377 - [c56]Tal Grinshpoun, Nurit Gal-Oz, Amnon Meisels, Ehud Gudes:
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities. Web Intelligence 2009: 34-41 - [e2]Ehud Gudes, Jaideep Vaidya:
Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings. Lecture Notes in Computer Science 5645, Springer 2009, ISBN 978-3-642-03006-2 [contents] - 2008
- [c55]Alex Roichman, Ehud Gudes:
DIWeDa - Detecting Intrusions in Web Databases. DBSec 2008: 313-329 - [c54]Yosef Shatsky, Ehud Gudes:
TOPS: a new design for transactions in publish/subscribe middleware. DEBS 2008: 201-210 - [c53]Boris Rozenberg, Ehud Gudes, Yuval Elovici:
A Distributed Framework for the Detection of New Worm-Related Malware. EuroISI 2008: 179-190 - [c52]Nurit Gal-Oz, Ehud Gudes, Danny Hendler:
A Robust and Knot-Aware Trust-Based Reputation Model. IFIPTM 2008: 167-182 - 2007
- [c51]Luis Vargas, Lauri I. W. Pesonen, Ehud Gudes, Jean Bacon:
Transactions in Content-Based Publish/Subscribe Middleware. ICDCS Workshops 2007: 68 - [c50]Alex Roichman, Ehud Gudes:
Fine-grained access control to web databases. SACMAT 2007: 31-40 - 2006
- [j26]Natalia Vanetik, Solomon Eyal Shimony, Ehud Gudes:
Support measures for graph data. Data Min. Knowl. Discov. 13(2): 243-260 (2006) - [j25]Boris Rozenberg, Ehud Gudes:
Association rules mining in vertically partitioned databases. Data Knowl. Eng. 59(2): 378-396 (2006) - [j24]Ehud Gudes, Solomon Eyal Shimony, Natalia Vanetik:
Discovering Frequent Graph Patterns Using Disjoint Paths. IEEE Trans. Knowl. Data Eng. 18(11): 1441-1456 (2006) - [c49]Noa Tuval, Ehud Gudes:
Resolving Information Flow Conflicts in RBAC Systems. DBSec 2006: 148-162 - [c48]Alex Gurevich, Ehud Gudes:
Recent Research on Privacy Preserving Data Mining. ICISS 2006: 377-380 - [c47]Alex Gurevich, Ehud Gudes:
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. IDEAS 2006: 121-128 - 2005
- [c46]Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes:
Designing Secure Indexes for Encrypted Databases. DBSec 2005: 54-68 - [c45]Ehud Gudes, Alexander Pertsev:
Mining Module for Adaptive XML Path Indexing. DEXA Workshops 2005: 1015-1019 - [c44]Paz Biber, Ehud Gudes:
Using Relevant Sets for Optimizing XML Indexes. WEBIST 2005: 13-23 - 2004
- [c43]Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce:
Information Flow Analysis for File Systems and Databases Using Labels. DBSec 2004: 125-141 - [c42]Moti Cohen, Ehud Gudes:
Diagonally Subgraphs Pattern Mining. DMKD 2004: 51-58 - [c41]Natalia Vanetik, Ehud Gudes:
Mining Frequent Labeled and Partially Labeled Graph Patterns. ICDE 2004: 91-102 - [c40]Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels:
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. ICICS 2004: 171-186 - [c39]Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes:
A Structure Preserving Database Encryption Scheme. Secure Data Management 2004: 28-40 - [c38]Lev-Arie Ratinov, Solomon Eyal Shimony, Ehud Gudes:
Probabilistic model for schema understanding and matching. SMC (5) 2004: 4768-4773 - [c37]Lev-Arie Ratinov, Ehud Gudes:
Abbreviation Expansion in Schema Matching and Web Integration. Web Intelligence 2004: 485-489 - 2003
- [j23]Rachel Ben-Eliyahu-Zohary, Ehud Gudes, Giovambattista Ianni:
Metaqueries: Semantics, complexity, and efficient algorithms. Artif. Intell. 149(1): 61-87 (2003) - [j22]Rachel Ben-Eliyahu-Zohary, Carmel Domshlak, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony:
FlexiMine - A Flexible Platform for KDD Research and Application Development. Ann. Math. Artif. Intell. 39(1-2): 175-204 (2003) - [c36]Ehud Gudes, Boris Rozenberg:
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. DBSec 2003: 91-104 - [c35]Alexander Binun, Ehud Gudes:
Policy and State Based Secure Wrapper and Its Application to Mobile Agents. LA-WEB 2003: 14-26 - [e1]Ehud Gudes, Sujeet Shenoi:
Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK. IFIP Conference Proceedings 256, Kluwer 2003, ISBN 1-4020-7541-3 [contents] - 2002
- [j21]Ehud Gudes, Aharon Tubman:
AutoWF - A secure Web workflow system using autonomous objects. Data Knowl. Eng. 43(1): 1-27 (2002) - [j20]Martin S. Olivier, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. Data Knowl. Eng. 43(3): 281-292 (2002) - [c34]Ehud Gudes, Carmel Domshlak, Natalia Orlov:
Remote Conferencing with Multimedia Objects. EDBT Workshops 2002: 526-543 - [c33]Raghav Kaushik, Pradeep Shenoy, Philip Bohannon, Ehud Gudes:
Exploiting Local Similarity for Indexing Paths in Graph-Structured Data. ICDE 2002: 129-140 - [c32]Natalia Vanetik, Ehud Gudes, Solomon Eyal Shimony:
Computing Frequent Graph Patterns from Semistructured Data. ICDM 2002: 458-465 - [c31]Mira Balaban, Nikolai Berezansky, Ehud Gudes:
Answering Cooperative Recursive Queries in Web Federated Databases. NGITS 2002: 14-28 - 2000
- [c30]Rachel Ben-Eliyahu-Zohary, Ehud Gudes:
Meta-queries - Computation and Evaluation. DaWaK 2000: 265-275 - [c29]Martin S. Olivier, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160
1990 – 1999
- 1999
- [j19]Ehud Gudes, Martin S. Olivier, Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace. J. Comput. Secur. 7(4): 287-315 (1999) - [j18]Natalija Krivokapic, Alfons Kemper, Ehud Gudes:
Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis. VLDB J. 8(2): 79-100 (1999) - [c28]Rachel Ben-Eliyahu-Zohary, Ehud Gudes:
Towards Efficient Metaquerying. IJCAI 1999: 800-805 - [c27]Amir Sapir, Ehud Gudes:
Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases. NGITS 1999: 94-111 - 1998
- [c26]Ehud Gudes, Martin S. Olivier:
Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107 - [c25]Martin S. Olivier, Reind P. van de Riet, Ehud Gudes:
Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351 - [c24]Amir Sapir, Ehud Gudes:
Dynamic Relationships and their Propagation Attributes in Object Oriented Databases. DEXA Workshop 1998: 967-974 - [c23]Carmel Domshlak, D. Gershkovich, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony:
FlexiMine - A Flexible Platform for KDD Research and Application Construction. KDD 1998: 184-188 - 1997
- [j17]Amnon Meisels, Jihad El-Sana, Ehud Gudes:
Decomposing and Solving Timetabling Constraint Networks. Comput. Intell. 13(4): 486-505 (1997) - [j16]Reind P. van de Riet, Andrea Junk, Ehud Gudes:
Security in Cyberspace: A Knowledge-Base Approach. Data Knowl. Eng. 24(1): 69-96 (1997) - [j15]Amnon Meisels, Ehud Gudes, Gadi Solotorevsky:
Combining rules and constraints for employee timetabling. Int. J. Intell. Syst. 12(6): 419-439 (1997) - [j14]Ehud Gudes:
A Uniform Indexing Scheme for Object-Oriented Databases. Inf. Syst. 22(4): 199-221 (1997) - [c22]Gadi Solotorvsky, Ehud Gudes:
Solving a Real-life Nurses Time Tabling and Transportation Problem Using Distributed CSP Techniques. AAAI Workshop: Constraints & Agents 1997: 148-153 - [c21]Masha Gendler-Fishman, Ehud Gudes:
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. DBSec 1997: 110-133 - [c20]Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195 - [c19]Masha Gendler-Fishman, Ehud Gudes:
A compile-time model for safe information flow in object-oriented databases. SEC 1997: 41-55 - 1996
- [c18]Gadi Solotorevsky, Ehud Gudes:
Algorithms for Solving Distributed Constraint Satisfaction Problems (DCSPs). AIPS 1996: 191-198 - [c17]Gadi Solotorevsky, Ehud Gudes, Amnon Meisels:
Modeling and Solving Distributed Constraint Satisfaction Problems (DCSPs). CP 1996: 561-562 - [c16]Reind P. van de Riet, Ehud Gudes:
An Object-Oriented Database Architecture for Providing Securty in Cyberspace. DBSec 1996: 120-144 - [c15]Ehud Gudes:
A Uniform Indexing Scheme for Object-Oriented Databases. ICDE 1996: 238-246 - 1995
- [c14]G. Trzewik, Ehud Gudes, Amnon Meisels, Gadi Solotorevsky:
TRAPS - A Time Dependent Resource Allocation Language. NGITS 1995 - [c13]Amnon Meisels, Ehud Gudes, Gadi Solotorevsky:
Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach. PATAT 1995: 93-105 - 1994
- [j13]Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994) - [j12]Gadi Solotorevsky, Ehud Gudes, Amnon Meisels:
RAPS: A Rule-Based Language for Specifying Resource Allocation and Time-Tabling. IEEE Trans. Knowl. Data Eng. 6(5): 681-697 (1994) - 1993
- [c12]Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes:
A Method-Based Authorization Model for Object-Oriented Databases. Security for Object-Oriented Systems 1993: 135-150 - [c11]Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernández:
A Model of Methods Access Authorization in Object-oriented Databases. VLDB 1993: 52-61 - 1991
- [j11]Amnon Meisels, Tsvi Kuflik, Ehud Gudes:
Limited-resource scheduling by generalized rule-based system. Knowl. Based Syst. 4(4): 215-224 (1991) - 1990
- [c10]Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98 - [c9]Ehud Gudes, Tsvi Kuflik, Amnon Meisels:
An Expert Systems Based Methodology for Solving Resource Allocation Problems. IEA/AIE (Vol. 1) 1990: 309-317
1980 – 1989
- 1989
- [c8]María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Security Policies in Object-Oriented Databases. DBSec 1989: 257-268 - [c7]Ehud Reches, Ehud Gudes, Ehud Shapiro:
A Distributed Locking Algorithm for A Transactions System in Flat Concurrent Prolog. FODO 1989: 304-320 - [c6]Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Security Model for Object-Oriented Databases. S&P 1989: 110-115 - 1988
- [j10]Peretz Shoval, Ehud Gudes, Moshe Goldstein:
GISD: a graphical interactive system for conceptual database design. Inf. Syst. 13(1): 81-95 (1988) - [j9]Brenda M. Ozaki, Eduardo B. Fernández, Ehud Gudes:
Software fault tolerance in architectures with hierarchical protection levels. IEEE Micro 8(4): 30-43 (1988) - 1987
- [j8]Ehud Gudes, Gilad Bracha:
GCI-A Tool for Developing Interactive CAD User Interfaces. Softw. Pract. Exp. 17(11): 783-799 (1987) - 1984
- [j7]David L. Spooner, Ehud Gudes:
A Unifying Approach to the Design of a Secure Database Operating System. IEEE Trans. Software Eng. 10(3): 310-319 (1984) - 1982
- [j6]Prabuddha De, Arun Sen, Ehud Gudes:
A new model for data base abstraction. Inf. Syst. 7(1): 1-12 (1982) - 1981
- [c5]Prabuddha De, Arun Sen, Ehud Gudes:
An Extended Entity-Relationship Model with Multi Level External Views. ER 1981: 455-472 - 1980
- [j5]Ehud Gudes:
The Design of a Cryptopgraphy Based Secure File System. IEEE Trans. Software Eng. 6(5): 411-420 (1980) - [c4]Ehud Gudes, Shalom Tsur:
Experiments with B-Tree Reorganization. SIGMOD Conference 1980: 200-206
1970 – 1979
- 1979
- [j4]Ehud Gudes, Anthony Hoffman:
A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System". Commun. ACM 22(10): 550-553 (1979) - [j3]Ehud Gudes, Harvey S. Koch, Fred A. Stahl:
Security in a Multi-Level Structured Model of a Data Base. Comput. J. 22(4): 303-306 (1979) - [c3]Patrick J. Conley, Ehud Gudes:
Design and implementation of a query command language using transition networks. COMPSAC 1979: 313-318 - 1978
- [c2]Johann P. Malmquist, Ehud Gudes, Edward L. Robertson:
Storage Allocation for Access Path Minimization in Network Structured Data Bases. JCDKB 1978: 319- - 1977
- [j2]Ehud Gudes:
Teaching data base systems using Date and Computing Surveys. SIGMOD Rec. 9(1): 47-49 (1977) - 1976
- [c1]Ehud Gudes, Harvey S. Koch, Fred A. Stahl:
The application of cryptography for data base security. AFIPS National Computer Conference 1976: 97-107 - 1973
- [j1]Ehud Gudes, A. Reiter:
On Evaluating Boolean Expressions. Softw. Pract. Exp. 3(4): 345-350 (1973)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint