dblp.uni-trier.dewww.uni-trier.de

Ehud Gudes Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
82EEEhud Gudes, Jaideep Vaidya: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings Springer 2009
81EEEhud Gudes, Nurith Gal-Oz, Alon Grubshtein: Methods for Computing Trust and Reputation While Preserving Privacy. DBSec 2009: 291-298
80EEBoris Rozenberg, Ehud Gudes, Yuval Elovici: SISR - A New Model for Epidemic Spreading of Electronic Threats. ISC 2009: 242-249
79EEBoris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel: Method for Detecting Unknown Malicious Executables. RAID 2009: 376-377
2008
78EEAlex Roichman, Ehud Gudes: DIWeDa - Detecting Intrusions in Web Databases. DBSec 2008: 313-329
77EEYosef Shatsky, Ehud Gudes, Ehud Gudes: TOPS: a new design for transactions in publish/subscribe middleware. DEBS 2008: 201-210
76EEYosef Shatsky, Ehud Gudes, Ehud Gudes: TOPS: a new design for transactions in publish/subscribe middleware. DEBS 2008: 201-210
75EEBoris Rozenberg, Ehud Gudes, Yuval Elovici: A Distributed Framework for the Detection of New Worm-Related Malware. EuroISI 2008: 179-190
2007
74EELuis Vargas, Lauri I. W. Pesonen, Ehud Gudes, Jean Bacon: Transactions in Content-Based Publish/Subscribe Middleware. ICDCS Workshops 2007: 68
73EEAlex Roichman, Ehud Gudes: Fine-grained access control to web databases. SACMAT 2007: 31-40
2006
72EENoa Tuval, Ehud Gudes: Resolving Information Flow Conflicts in RBAC Systems. DBSec 2006: 148-162
71EEAlex Gurevich, Ehud Gudes: Recent Research on Privacy Preserving Data Mining. ICISS 2006: 377-380
70EEAlex Gurevich, Ehud Gudes: Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. IDEAS 2006: 121-128
69EEBoris Rozenberg, Ehud Gudes: Association rules mining in vertically partitioned databases. Data Knowl. Eng. 59(2): 378-396 (2006)
68EENatalia Vanetik, Solomon Eyal Shimony, Ehud Gudes: Support measures for graph data. Data Min. Knowl. Discov. 13(2): 243-260 (2006)
67EEEhud Gudes, Solomon Eyal Shimony, Natalia Vanetik: Discovering Frequent Graph Patterns Using Disjoint Paths. IEEE Trans. Knowl. Data Eng. 18(11): 1441-1456 (2006)
2005
66EEErez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes: Designing Secure Indexes for Encrypted Databases. DBSec 2005: 54-68
65EEEhud Gudes, Alexander Pertsev: Mining Module for Adaptive XML Path Indexing. DEXA Workshops 2005: 1015-1019
64 Paz Biber, Ehud Gudes: Using Relevant Sets for Optimizing XML Indexes. WEBIST 2005: 13-23
2004
63 Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce: Information Flow Analysis for File Systems and Databases Using Labels. DBSec 2004: 125-141
62EEMoti Cohen, Ehud Gudes: Diagonally Subgraphs Pattern Mining. DMKD 2004: 51-58
61EENatalia Vanetik, Ehud Gudes: Mining Frequent Labeled and Partially Labeled Graph Patterns. ICDE 2004: 91-102
60EEIlanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels: A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. ICICS 2004: 171-186
59EELev-Arie Ratinov, Solomon Eyal Shimony, Ehud Gudes: Probabilistic model for schema understanding and matching. SMC (5) 2004: 4768-4773
58EEYuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes: A Structure Preserving Database Encryption Scheme. Secure Data Management 2004: 28-40
57EELev-Arie Ratinov, Ehud Gudes: Abbreviation Expansion in Schema Matching and Web Integration. Web Intelligence 2004: 485-489
2003
56 Ehud Gudes, Sujeet Shenoi: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK Kluwer 2003
55 Ehud Gudes, Boris Rozenberg: Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. DBSec 2003: 91-104
54EEAlexander Binun, Ehud Gudes: Policy and State Based Secure Wrapper and Its Application to Mobile Agents. LA-WEB 2003: 14-26
53 Rachel Ben-Eliyahu-Zohary, Carmel Domshlak, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony: FlexiMine - A Flexible Platform for KDD Research and Application Development. Ann. Math. Artif. Intell. 39(1-2): 175-204 (2003)
52EERachel Ben-Eliyahu-Zohary, Ehud Gudes, Giovambattista Ianni: Metaqueries: Semantics, complexity, and efficient algorithms. Artif. Intell. 149(1): 61-87 (2003)
2002
51EEEhud Gudes, Carmel Domshlak, Natalia Orlov: Remote Conferencing with Multimedia Objects. EDBT Workshops 2002: 526-543
50EERaghav Kaushik, Pradeep Shenoy, Philip Bohannon, Ehud Gudes: Exploiting Local Similarity for Indexing Paths in Graph-Structured Data. ICDE 2002: 129-140
49EENatalia Vanetik, Ehud Gudes, Solomon Eyal Shimony: Computing Frequent Graph Patterns from Semistructured Data. ICDM 2002: 458-465
48EEMira Balaban, Nikolai Berezansky, Ehud Gudes: Answering Cooperative Recursive Queries in Web Federated Databases. NGITS 2002: 14-28
47EEEhud Gudes, Aharon Tubman: AutoWF - A secure Web workflow system using autonomous objects. Data Knowl. Eng. 43(1): 1-27 (2002)
46EEMartin S. Olivier, Ehud Gudes: Wrappers - a mechanism to support state-based authorisation in Web applications. Data Knowl. Eng. 43(3): 281-292 (2002)
2000
45 Martin S. Olivier, Ehud Gudes: Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160
44EERachel Ben-Eliyahu-Zohary, Ehud Gudes: Meta-queries - Computation and Evaluation. DaWaK 2000: 265-275
1999
43 Rachel Ben-Eliyahu-Zohary, Ehud Gudes: Towards Efficient Metaquerying. IJCAI 1999: 800-805
42EEAmir Sapir, Ehud Gudes: Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases. NGITS 1999: 94-111
41 Ehud Gudes, Martin S. Olivier, Reind P. van de Riet: Modeling, Specifying and Implementing Workflow Security in Cyberspace. Journal of Computer Security 7(4): (1999)
40EENatalija Krivokapic, Alfons Kemper, Ehud Gudes: Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis. VLDB J. 8(2): 79-100 (1999)
1998
39 Ehud Gudes, Martin S. Olivier: Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107
38 Martin S. Olivier, Reind P. van de Riet, Ehud Gudes: Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351
37 Amir Sapir, Ehud Gudes: Dynamic Relationships and their Propagation Attributes in Object Oriented Databases. DEXA Workshop 1998: 967-974
36 Carmel Domshlak, D. Gershkovich, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony: FlexiMine - A Flexible Platform for KDD Research and Application Construction. KDD 1998: 184-188
1997
35 Masha Gendler-Fishman, Ehud Gudes: Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. DBSec 1997: 110-133
34 Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier: Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195
33 Masha Gendler-Fishman, Ehud Gudes: A compile-time model for safe information flow in object-oriented databases. SEC 1997: 41-55
32 Amnon Meisels, Jihad El-Sana, Ehud Gudes: Decomposing and Solving Timetabling Constraint Networks. Computational Intelligence 13(4): 486-505 (1997)
31EEReind P. van de Riet, Andrea Junk, Ehud Gudes: Security in Cyberspace: A Knowledge-Base Approach. Data Knowl. Eng. 24(1): 69-96 (1997)
30EEEhud Gudes: A Uniform Indexing Scheme for Object-Oriented Databases. Inf. Syst. 22(4): 199-221 (1997)
1996
29 Gadi Solotorevsky, Ehud Gudes: Algorithms for Solving Distributed Constraint Satisfaction Problems (DCSPs). AIPS 1996: 191-198
28 Gadi Solotorevsky, Ehud Gudes, Amnon Meisels: Modeling and Solving Distributed Constraint Satisfaction Problems (DCSPs). CP 1996: 561-562
27 Reind P. van de Riet, Ehud Gudes: An Object-Oriented Database Architecture for Providing Securty in Cyberspace. DBSec 1996: 120-144
26EEEhud Gudes: A Uniform Indexing Scheme for Object-Oriented Databases. ICDE 1996: 238-246
1995
25 G. Trzewik, Ehud Gudes, Amnon Meisels, Gadi Solotorevsky: TRAPS - A Time Dependent Resource Allocation Language. NGITS 1995: 0-
24 Amnon Meisels, Ehud Gudes, Gadi Solotorevsky: Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach. PATAT 1995: 93-105
1994
23EEEduardo B. Fernández, Ehud Gudes, Haiyan Song: A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994)
22EEGadi Solotorevsky, Ehud Gudes, Amnon Meisels: RAPS: A Rule-Based Language for Specifying Resource Allocation and Time-Tabling. IEEE Trans. Knowl. Data Eng. 6(5): 681-697 (1994)
1993
21 Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes: A Method-Based Authorization Model for Object-Oriented Databases. Security for Object-Oriented Systems 1993: 135-150
20EENurith Gal-Oz, Ehud Gudes, Eduardo B. Fernández: A Model of Methods Access Authorization in Object-oriented Databases. VLDB 1993: 52-61
1991
19EEAmnon Meisels, Tsvi Kuflik, Ehud Gudes: Limited-resource scheduling by generalized rule-based system. Knowl.-Based Syst. 4(4): 215-224 (1991)
1990
18 Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98
17EEEhud Gudes, Tsvi Kuflik, Amnon Meisels: An Expert Systems Based Methodology for Solving Resource Allocation Problems. IEA/AIE (Vol. 1) 1990: 309-317
1989
16 María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Security Policies in Object-Oriented Databases. DBSec 1989: 257-268
15 Ehud Reches, Ehud Gudes, Ehud Y. Shapiro: A Distributed Locking Algorithm for A Transactions System in Flat Concurrent Prolog. FODO 1989: 304-319
14 Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Security Model for Object-Oriented Databases. IEEE Symposium on Security and Privacy 1989: 110-115
1988
13 Peretz Shoval, Ehud Gudes, Moshe Goldstein: GISD: a graphical interactive system for conceptual database design. Inf. Syst. 13(1): 81-95 (1988)
1987
12 Ehud Gudes, Gilad Bracha: GCI-A Tool for Developing Interactive CAD User Interfaces. Softw., Pract. Exper. 17(11): 783-799 (1987)
1984
11 David L. Spooner, Ehud Gudes: A Unifying Approach to the Design of a Secure Database Operating System. IEEE Trans. Software Eng. 10(3): 310-319 (1984)
1982
10 Prabuddha De, Arun Sen, Ehud Gudes: A new model for data base abstraction. Inf. Syst. 7(1): 1-12 (1982)
1981
9EEPrabuddha De, Arun Sen, Ehud Gudes: An Extended Entity-Relationship Model with Multi Level External Views. ER 1981: 455-472
1980
8EEEhud Gudes, Shalom Tsur: Experiments with B-Tree Reorganization. SIGMOD Conference 1980: 200-206
7 Ehud Gudes: The Design of a Cryptopgraphy Based Secure File System. IEEE Trans. Software Eng. 6(5): 411-420 (1980)
1979
6 Ehud Gudes, Anthony Hoffman: A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System". Commun. ACM 22(10): 550-553 (1979)
5 Ehud Gudes, Harvey S. Koch, Fred A. Stahl: Security in a Multi-Level Structured Model of a Data Base. Comput. J. 22(4): 303-306 (1979)
1978
4 Johann P. Malmquist, Ehud Gudes, Edward L. Robertson: Storage Allocation for Access Path Minimization in Network Structured Data Bases. JCDKB 1978: 319-
1977
3EEEhud Gudes: Teaching data base systems using Date and Computing Surveys. SIGMOD Record 9(1): 47-49 (1977)
1976
2EEEhud Gudes, Harvey S. Koch, Fred A. Stahl: The application of cryptography for data base security. AFIPS National Computer Conference 1976: 97-107
1973
1 Ehud Gudes, A. Reiter: On Evaluating Boolean Expressions. Softw., Pract. Exper. 3(4): 345-350 (1973)

Coauthor Index

1Jean Bacon [74]
2Mira Balaban [48]
3Rachel Ben-Eliyahu-Zohary (Rachel Ben-Eliyahu) [43] [44] [52] [53]
4Nikolai Berezansky [48]
5Paz Biber [64]
6Alexander Binun [54]
7Philip Bohannon [50]
8Gilad Bracha [12]
9J. F. M. Burg [34]
10Moti Cohen [62]
11Prabuddha De [9] [10]
12Carmel Domshlak [36] [51] [53]
13Jihad El-Sana [32]
14Yuval Elovici [58] [66] [75] [79] [80]
15Eduardo B. Fernández [14] [16] [18] [20] [21] [23]
16Yuval Fledel [79]
17Nurith Gal-Oz [20] [81]
18Masha Gendler-Fishman [33] [35]
19D. Gershkovich [36]
20Moshe Goldstein [13]
21Alon Grubshtein [81]
22Alex Gurevich [70] [71]
23Anthony Hoffman [6]
24Giovambattista Ianni [52]
25Andrea Junk [31]
26Raghav Kaushik [50]
27Alfons Kemper [40]
28Harvey S. Koch [2] [5]
29Natalija Krivokapic [40]
30Tsvi Kuflik [17] [19]
31María M. Larrondo-Petrie (Maria M. Larrondo-Petrie) [16] [21]
32Oz Lavee [60]
33N. Liusternik [36] [53]
34Johann P. Malmquist [4]
35Luigi V. Mancini [63]
36Amnon Meisels [17] [19] [22] [24] [25] [28] [32] [36] [53] [60]
37Ilanit Moodahi [60]
38Martin S. Olivier [34] [38] [39] [41] [45] [46]
39Natalia Orlov [51]
40Francesco Parisi-Presicce [63]
41Alexander Pertsev [65]
42Lauri I. W. Pesonen [74]
43Lev-Arie Ratinov [57] [59]
44Ehud Reches [15]
45A. Reiter [1]
46Reind P. van de Riet [27] [31] [34] [38] [41]
47Edward L. Robertson [4]
48Alex Roichman [73] [78]
49Tzachi Rosen [36] [53]
50Boris Rozenberg [55] [69] [75] [79] [80]
51Amir Sapir [37] [42]
52Arun Sen [9] [10]
53Ehud Y. Shapiro [15]
54Yosef Shatsky [77]
55Sujeet Shenoi [56]
56Pradeep Shenoy [50]
57Solomon Eyal Shimony [36] [49] [53] [59] [67] [68]
58Erez Shmueli [58] [66]
59Peretz Shoval [13]
60Gadi Solotorevsky [22] [24] [25] [28] [29]
61Haiyan Song [14] [16] [18] [23]
62David L. Spooner [11]
63Fred A. Stahl [2] [5]
64G. Trzewik [25]
65Shalom Tsur [8]
66Aharon Tubman [47]
67Noa Tuval [72]
68Jaideep Vaidya [82]
69Ronen Vaisenberg (Ronen Waisenberg) [58] [66]
70Natalia Vanetik [49] [61] [67] [68]
71Luis Vargas [74]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)