2008 |
78 | EE | Alex Roichman,
Ehud Gudes:
DIWeDa - Detecting Intrusions in Web Databases.
DBSec 2008: 313-329 |
77 | EE | Yosef Shatsky,
Ehud Gudes,
Ehud Gudes:
TOPS: a new design for transactions in publish/subscribe middleware.
DEBS 2008: 201-210 |
76 | EE | Yosef Shatsky,
Ehud Gudes,
Ehud Gudes:
TOPS: a new design for transactions in publish/subscribe middleware.
DEBS 2008: 201-210 |
75 | EE | Boris Rozenberg,
Ehud Gudes,
Yuval Elovici:
A Distributed Framework for the Detection of New Worm-Related Malware.
EuroISI 2008: 179-190 |
2007 |
74 | EE | Luis Vargas,
Lauri I. W. Pesonen,
Ehud Gudes,
Jean Bacon:
Transactions in Content-Based Publish/Subscribe Middleware.
ICDCS Workshops 2007: 68 |
73 | EE | Alex Roichman,
Ehud Gudes:
Fine-grained access control to web databases.
SACMAT 2007: 31-40 |
2006 |
72 | EE | Noa Tuval,
Ehud Gudes:
Resolving Information Flow Conflicts in RBAC Systems.
DBSec 2006: 148-162 |
71 | EE | Alex Gurevich,
Ehud Gudes:
Recent Research on Privacy Preserving Data Mining.
ICISS 2006: 377-380 |
70 | EE | Alex Gurevich,
Ehud Gudes:
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation.
IDEAS 2006: 121-128 |
69 | EE | Boris Rozenberg,
Ehud Gudes:
Association rules mining in vertically partitioned databases.
Data Knowl. Eng. 59(2): 378-396 (2006) |
68 | EE | Natalia Vanetik,
Solomon Eyal Shimony,
Ehud Gudes:
Support measures for graph data.
Data Min. Knowl. Discov. 13(2): 243-260 (2006) |
67 | EE | Ehud Gudes,
Solomon Eyal Shimony,
Natalia Vanetik:
Discovering Frequent Graph Patterns Using Disjoint Paths.
IEEE Trans. Knowl. Data Eng. 18(11): 1441-1456 (2006) |
2005 |
66 | EE | Erez Shmueli,
Ronen Waisenberg,
Yuval Elovici,
Ehud Gudes:
Designing Secure Indexes for Encrypted Databases.
DBSec 2005: 54-68 |
65 | EE | Ehud Gudes,
Alexander Pertsev:
Mining Module for Adaptive XML Path Indexing.
DEXA Workshops 2005: 1015-1019 |
64 | | Paz Biber,
Ehud Gudes:
Using Relevant Sets for Optimizing XML Indexes.
WEBIST 2005: 13-23 |
2004 |
63 | | Ehud Gudes,
Luigi V. Mancini,
Francesco Parisi-Presicce:
Information Flow Analysis for File Systems and Databases Using Labels.
DBSec 2004: 125-141 |
62 | EE | Moti Cohen,
Ehud Gudes:
Diagonally Subgraphs Pattern Mining.
DMKD 2004: 51-58 |
61 | EE | Natalia Vanetik,
Ehud Gudes:
Mining Frequent Labeled and Partially Labeled Graph Patterns.
ICDE 2004: 91-102 |
60 | EE | Ilanit Moodahi,
Ehud Gudes,
Oz Lavee,
Amnon Meisels:
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.
ICICS 2004: 171-186 |
59 | EE | Lev-Arie Ratinov,
Solomon Eyal Shimony,
Ehud Gudes:
Probabilistic model for schema understanding and matching.
SMC (5) 2004: 4768-4773 |
58 | EE | Yuval Elovici,
Ronen Waisenberg,
Erez Shmueli,
Ehud Gudes:
A Structure Preserving Database Encryption Scheme.
Secure Data Management 2004: 28-40 |
57 | EE | Lev-Arie Ratinov,
Ehud Gudes:
Abbreviation Expansion in Schema Matching and Web Integration.
Web Intelligence 2004: 485-489 |
2003 |
56 | | Ehud Gudes,
Sujeet Shenoi:
Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK
Kluwer 2003 |
55 | | Ehud Gudes,
Boris Rozenberg:
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases.
DBSec 2003: 91-104 |
54 | EE | Alexander Binun,
Ehud Gudes:
Policy and State Based Secure Wrapper and Its Application to Mobile Agents.
LA-WEB 2003: 14-26 |
53 | | Rachel Ben-Eliyahu-Zohary,
Carmel Domshlak,
Ehud Gudes,
N. Liusternik,
Amnon Meisels,
Tzachi Rosen,
Solomon Eyal Shimony:
FlexiMine - A Flexible Platform for KDD Research and Application Development.
Ann. Math. Artif. Intell. 39(1-2): 175-204 (2003) |
52 | EE | Rachel Ben-Eliyahu-Zohary,
Ehud Gudes,
Giovambattista Ianni:
Metaqueries: Semantics, complexity, and efficient algorithms.
Artif. Intell. 149(1): 61-87 (2003) |
2002 |
51 | EE | Ehud Gudes,
Carmel Domshlak,
Natalia Orlov:
Remote Conferencing with Multimedia Objects.
EDBT Workshops 2002: 526-543 |
50 | EE | Raghav Kaushik,
Pradeep Shenoy,
Philip Bohannon,
Ehud Gudes:
Exploiting Local Similarity for Indexing Paths in Graph-Structured Data.
ICDE 2002: 129-140 |
49 | EE | Natalia Vanetik,
Ehud Gudes,
Solomon Eyal Shimony:
Computing Frequent Graph Patterns from Semistructured Data.
ICDM 2002: 458-465 |
48 | EE | Mira Balaban,
Nikolai Berezansky,
Ehud Gudes:
Answering Cooperative Recursive Queries in Web Federated Databases.
NGITS 2002: 14-28 |
47 | EE | Ehud Gudes,
Aharon Tubman:
AutoWF - A secure Web workflow system using autonomous objects.
Data Knowl. Eng. 43(1): 1-27 (2002) |
46 | EE | Martin S. Olivier,
Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications.
Data Knowl. Eng. 43(3): 281-292 (2002) |
2000 |
45 | | Martin S. Olivier,
Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications.
DBSec 2000: 149-160 |
44 | EE | Rachel Ben-Eliyahu-Zohary,
Ehud Gudes:
Meta-queries - Computation and Evaluation.
DaWaK 2000: 265-275 |
1999 |
43 | | Rachel Ben-Eliyahu-Zohary,
Ehud Gudes:
Towards Efficient Metaquerying.
IJCAI 1999: 800-805 |
42 | EE | Amir Sapir,
Ehud Gudes:
Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases.
NGITS 1999: 94-111 |
41 | | Ehud Gudes,
Martin S. Olivier,
Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace.
Journal of Computer Security 7(4): (1999) |
40 | EE | Natalija Krivokapic,
Alfons Kemper,
Ehud Gudes:
Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis.
VLDB J. 8(2): 79-100 (1999) |
1998 |
39 | | Ehud Gudes,
Martin S. Olivier:
Security Policies in Replicated and Autonomous Databases.
DBSec 1998: 93-107 |
38 | | Martin S. Olivier,
Reind P. van de Riet,
Ehud Gudes:
Specifying Application-Level Security in Workflow Systems.
DEXA Workshop 1998: 346-351 |
37 | | Amir Sapir,
Ehud Gudes:
Dynamic Relationships and their Propagation Attributes in Object Oriented Databases.
DEXA Workshop 1998: 967-974 |
36 | | Carmel Domshlak,
D. Gershkovich,
Ehud Gudes,
N. Liusternik,
Amnon Meisels,
Tzachi Rosen,
Solomon Eyal Shimony:
FlexiMine - A Flexible Platform for KDD Research and Application Construction.
KDD 1998: 184-188 |
1997 |
35 | | Masha Gendler-Fishman,
Ehud Gudes:
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases.
DBSec 1997: 110-133 |
34 | | Ehud Gudes,
Reind P. van de Riet,
J. F. M. Burg,
Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
DBSec 1997: 182-195 |
33 | | Masha Gendler-Fishman,
Ehud Gudes:
A compile-time model for safe information flow in object-oriented databases.
SEC 1997: 41-55 |
32 | | Amnon Meisels,
Jihad El-Sana,
Ehud Gudes:
Decomposing and Solving Timetabling Constraint Networks.
Computational Intelligence 13(4): 486-505 (1997) |
31 | EE | Reind P. van de Riet,
Andrea Junk,
Ehud Gudes:
Security in Cyberspace: A Knowledge-Base Approach.
Data Knowl. Eng. 24(1): 69-96 (1997) |
30 | EE | Ehud Gudes:
A Uniform Indexing Scheme for Object-Oriented Databases.
Inf. Syst. 22(4): 199-221 (1997) |
1996 |
29 | | Gadi Solotorevsky,
Ehud Gudes:
Algorithms for Solving Distributed Constraint Satisfaction Problems (DCSPs).
AIPS 1996: 191-198 |
28 | | Gadi Solotorevsky,
Ehud Gudes,
Amnon Meisels:
Modeling and Solving Distributed Constraint Satisfaction Problems (DCSPs).
CP 1996: 561-562 |
27 | | Reind P. van de Riet,
Ehud Gudes:
An Object-Oriented Database Architecture for Providing Securty in Cyberspace.
DBSec 1996: 120-144 |
26 | EE | Ehud Gudes:
A Uniform Indexing Scheme for Object-Oriented Databases.
ICDE 1996: 238-246 |
1995 |
25 | | G. Trzewik,
Ehud Gudes,
Amnon Meisels,
Gadi Solotorevsky:
TRAPS - A Time Dependent Resource Allocation Language.
NGITS 1995: 0- |
24 | | Amnon Meisels,
Ehud Gudes,
Gadi Solotorevsky:
Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach.
PATAT 1995: 93-105 |
1994 |
23 | EE | Eduardo B. Fernández,
Ehud Gudes,
Haiyan Song:
A Model for Evaluation and Administration of Security in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994) |
22 | EE | Gadi Solotorevsky,
Ehud Gudes,
Amnon Meisels:
RAPS: A Rule-Based Language for Specifying Resource Allocation and Time-Tabling.
IEEE Trans. Knowl. Data Eng. 6(5): 681-697 (1994) |
1993 |
21 | | Eduardo B. Fernández,
María M. Larrondo-Petrie,
Ehud Gudes:
A Method-Based Authorization Model for Object-Oriented Databases.
Security for Object-Oriented Systems 1993: 135-150 |
20 | EE | Nurith Gal-Oz,
Ehud Gudes,
Eduardo B. Fernández:
A Model of Methods Access Authorization in Object-oriented Databases.
VLDB 1993: 52-61 |
1991 |
19 | EE | Amnon Meisels,
Tsvi Kuflik,
Ehud Gudes:
Limited-resource scheduling by generalized rule-based system.
Knowl.-Based Syst. 4(4): 215-224 (1991) |
1990 |
18 | | Ehud Gudes,
Haiyan Song,
Eduardo B. Fernández:
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases.
DBSec 1990: 85-98 |
17 | EE | Ehud Gudes,
Tsvi Kuflik,
Amnon Meisels:
An Expert Systems Based Methodology for Solving Resource Allocation Problems.
IEA/AIE (Vol. 1) 1990: 309-317 |
1989 |
16 | | María M. Larrondo-Petrie,
Ehud Gudes,
Haiyan Song,
Eduardo B. Fernández:
Security Policies in Object-Oriented Databases.
DBSec 1989: 257-268 |
15 | | Ehud Reches,
Ehud Gudes,
Ehud Y. Shapiro:
A Distributed Locking Algorithm for A Transactions System in Flat Concurrent Prolog.
FODO 1989: 304-319 |
14 | | Eduardo B. Fernández,
Ehud Gudes,
Haiyan Song:
A Security Model for Object-Oriented Databases.
IEEE Symposium on Security and Privacy 1989: 110-115 |
1988 |
13 | | Peretz Shoval,
Ehud Gudes,
Moshe Goldstein:
GISD: a graphical interactive system for conceptual database design.
Inf. Syst. 13(1): 81-95 (1988) |
1987 |
12 | | Ehud Gudes,
Gilad Bracha:
GCI-A Tool for Developing Interactive CAD User Interfaces.
Softw., Pract. Exper. 17(11): 783-799 (1987) |
1984 |
11 | | David L. Spooner,
Ehud Gudes:
A Unifying Approach to the Design of a Secure Database Operating System.
IEEE Trans. Software Eng. 10(3): 310-319 (1984) |
1982 |
10 | | Prabuddha De,
Arun Sen,
Ehud Gudes:
A new model for data base abstraction.
Inf. Syst. 7(1): 1-12 (1982) |
1981 |
9 | EE | Prabuddha De,
Arun Sen,
Ehud Gudes:
An Extended Entity-Relationship Model with Multi Level External Views.
ER 1981: 455-472 |
1980 |
8 | EE | Ehud Gudes,
Shalom Tsur:
Experiments with B-Tree Reorganization.
SIGMOD Conference 1980: 200-206 |
7 | | Ehud Gudes:
The Design of a Cryptopgraphy Based Secure File System.
IEEE Trans. Software Eng. 6(5): 411-420 (1980) |
1979 |
6 | | Ehud Gudes,
Anthony Hoffman:
A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System".
Commun. ACM 22(10): 550-553 (1979) |
5 | | Ehud Gudes,
Harvey S. Koch,
Fred A. Stahl:
Security in a Multi-Level Structured Model of a Data Base.
Comput. J. 22(4): 303-306 (1979) |
1978 |
4 | | Johann P. Malmquist,
Ehud Gudes,
Edward L. Robertson:
Storage Allocation for Access Path Minimization in Network Structured Data Bases.
JCDKB 1978: 319- |
1977 |
3 | EE | Ehud Gudes:
Teaching data base systems using Date and Computing Surveys.
SIGMOD Record 9(1): 47-49 (1977) |
1976 |
2 | EE | Ehud Gudes,
Harvey S. Koch,
Fred A. Stahl:
The application of cryptography for data base security.
AFIPS National Computer Conference 1976: 97-107 |
1973 |
1 | | Ehud Gudes,
A. Reiter:
On Evaluating Boolean Expressions.
Softw., Pract. Exper. 3(4): 345-350 (1973) |