


Остановите войну!
for scientists:
Ehud Gudes
Person information

- affiliation: Ben-Gurion University, Beersheba, Israel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j42]Nadav Voloch, Nurit Gal-Oz
, Ehud Gudes:
A Trust based Privacy Providing Model for Online Social Networks. Online Soc. Networks Media 24: 100138 (2021) - [j41]Philip Derbeko
, Shlomi Dolev, Ehud Gudes:
Wavelet-based dynamic and privacy-preserving similitude data models for edge computing. Wirel. Networks 27(1): 351-366 (2021) - [c107]Yakov Vainshtein, Ehud Gudes:
Use of Blockchain for Ensuring Data Integrity in Cloud Databases. CSCML 2021: 325-335 - [c106]Nadav Voloch, Ehud Gudes, Nurit Gal-Oz
:
Implementing GDPR in Social Networks Using Trust and Context. CSCML 2021: 497-503 - [c105]Adi Swissa, Ehud Gudes:
An ABAC Model with Trust and Gossiping (ABAC-TG) for Online Social Networks. DBSec 2021: 377-392 - [c104]Grisha Weintraub, Ehud Gudes, Shlomi Dolev:
Needle in a haystack queries in cloud data lakes. EDBT/ICDT Workshops 2021 - [c103]Shlomi Dolev, Ehud Gudes, Hannah Yair:
Automatic Real Time Platoon Formation Using the Road Graph. NCA 2021: 1-4 - [c102]Nadav Voloch, Ehud Gudes, Nurit Gal-Oz
:
Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model. NSS 2021: 100-115 - [c101]Grisha Weintraub
, Ehud Gudes, Shlomi Dolev:
Indexing cloud data lakes within the lakes. SYSTOR 2021: 22:1 - 2020
- [c100]Nadav Voloch, Ehud Gudes, Nurit Gal-Oz
:
Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks. COMPLEX NETWORKS (1) 2020: 641-650 - [c99]Eyal Paz, Ehud Gudes:
Comparison of DNS Based Methods for Detecting Malicious Domains. CSCML 2020: 219-236 - [c98]Amir Lukach, Ehud Gudes, Asaf Shabtai:
PUA Detection Based on Bundle Installer Characteristics. DBSec 2020: 261-273
2010 – 2019
- 2019
- [j40]Nurit Gal-Oz
, Yaron Gonen, Ehud Gudes:
Mining meaningful and rare roles from web application usage patterns. Comput. Secur. 82: 296-313 (2019) - [j39]Shlomi Dolev
, Patricia Florissi, Ehud Gudes, Shantanu Sharma
, Ido Singer:
A Survey on Geographically Distributed Big-Data Processing Using MapReduce. IEEE Trans. Big Data 5(1): 60-80 (2019) - [c97]Philip Derbeko, Shlomi Dolev, Ehud Gudes:
Deep Neural Networks as Similitude Models for Sharing Big Data. IEEE BigData 2019: 5728-5736 - [c96]Philip Derbeko, Shlomi Dolev, Ehud Gudes:
MLDStore - DNNs as Similitude Models for Sharing Big Data (Brief Announcement). CSCML 2019: 93-96 - [c95]Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes:
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility. CSCML 2019: 156-168 - [c94]Nadav Voloch, Ehud Gudes:
An MST-based information flow model for security in Online Social Networks. ICUFN 2019: 460-465 - [c93]Nadav Voloch, Priel Nissim, Mor Elmakies, Ehud Gudes:
A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks. IFIPTM 2019: 19-27 - 2018
- [j38]Yaron Gonen, Ehud Gudes, Kirill Kandalov:
New and Efficient Algorithms for Producing Frequent Itemsets with the Map-Reduce Framework. Algorithms 11(12): 194 (2018) - [j37]Silvie Levy, Ehud Gudes, Nurit Gal-Oz
:
Sharing-habits based privacy control in social networks. J. Comput. Secur. 26(2): 177-205 (2018) - [c92]Ehud Gudes, Nadav Voloch:
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors. CSCML 2018: 55-67 - [c91]Philip Derbeko, Shlomi Dolev, Ehud Gudes:
Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation. CSCML 2018: 105-119 - [c90]Grisha Weintraub
, Ehud Gudes:
Data Integrity Verification in Column-Oriented NoSQL Databases. DBSec 2018: 165-181 - 2017
- [j36]Ishai Rosenberg, Ehud Gudes:
Bypassing system calls-based intrusion detection systems. Concurr. Comput. Pract. Exp. 29(16) (2017) - [c89]Kirill Kandalov, Ehud Gudes:
Incremental Frequent Itemsets Mining with MapReduce. ADBIS 2017: 247-261 - [c88]Philip Derbeko, Shlomi Dolev
, Ehud Gudes, Jeffrey D. Ullman:
Efficient and private approximations of distributed databases calculations. IEEE BigData 2017: 4487-4496 - [c87]Grisha Weintraub
, Ehud Gudes:
Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud. CCGrid 2017: 498-503 - [c86]Nir Maoz, Ehud Gudes:
Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party. CSCML 2017: 193-195 - [c85]Yossif Shalabi, Ehud Gudes:
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases. DBSec 2017: 3-19 - [c84]Alexey Rabin, Ehud Gudes:
Secure Protocol of ABAC Certificates Revocation and Delegation. FPS 2017: 35-50 - [c83]Hussien Othman, Ehud Gudes, Nurit Gal-Oz:
Advanced Flow Models for Computing the Reputation of Internet Domains. IFIPTM 2017: 119-134 - [i3]Shlomi Dolev, Patricia Florissi, Ehud Gudes, Shantanu Sharma, Ido Singer:
A Survey on Geographically Distributed Big-Data Processing using MapReduce. CoRR abs/1707.01869 (2017) - 2016
- [j35]Philip Derbeko, Shlomi Dolev
, Ehud Gudes, Shantanu Sharma:
Security and privacy aspects in MapReduce on clouds: A survey. Comput. Sci. Rev. 20: 1-28 (2016) - [j34]Michal Davidson, Tamir Tassa, Ehud Gudes:
Content sharing schemes in DRM systems with enhanced performance and privacy preservation. J. Comput. Secur. 24(6): 667-688 (2016) - [c82]Philip Derbeko, Shlomi Dolev
, Ehud Gudes, Jeffrey D. Ullman:
Concise essence-preserving big data representation. IEEE BigData 2016: 3662-3665 - [c81]Silvie Levy, Ehud Gudes, Nurit Gal-Oz:
Sharing-Habits Based Privacy Control in Social Networks. DBSec 2016: 217-232 - [c80]Tamir Lavi, Ehud Gudes:
Trust-based Dynamic RBAC. ICISSP 2016: 317-324 - [c79]Ishai Rosenberg, Ehud Gudes:
Evading System-Calls Based Intrusion Detection Systems. NSS 2016: 200-216 - [c78]Yaron Gonen, Ehud Gudes:
An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets. SwSTE 2016: 77-83 - [c77]Ishai Rosenberg, Ehud Gudes:
Attacking and Defending Dynamic Analysis System-Calls Based IDS. WISTP 2016: 103-119 - [i2]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma:
Security and Privacy Aspects in MapReduce on Clouds: A Survey. CoRR abs/1605.00677 (2016) - [i1]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Jeffrey D. Ullman:
Efficient and Private Approximations of Distributed Databases Calculations. CoRR abs/1605.06143 (2016) - 2015
- [c76]Igor Mishsky, Nurit Gal-Oz, Ehud Gudes:
A Topology Based Flow Model for Computing Domain Reputation. DBSec 2015: 277-292 - [c75]Ehud Gudes:
Reputation - from Social Perception to Internet Security. IFIPTM 2015: 3-10 - 2014
- [j33]Rachel Ben-Eliyahu-Zohary, Tal Grinshpoun
, Elena Churkin, Ehud Gudes:
Monotonic qualitative logic programs: Computation and applications. AI Commun. 27(3): 213-228 (2014) - [j32]Erez Shmueli, Ronen Vaisenberg, Ehud Gudes, Yuval Elovici:
Implementing a database encryption solution, design and implementation issues. Comput. Secur. 44: 33-50 (2014) - [c74]Michal Davidson, Ehud Gudes, Tamir Tassa:
Efficient and Enhanced Solutions for Content Sharing in DRM Systems. DBSec 2014: 373-381 - [c73]Moshe Unger, Lior Rokach, Ariel Bar, Ehud Gudes, Bracha Shapira:
Contexto: lessons learned from mobile context inference. UbiComp Adjunct 2014: 175-178 - [c72]Igor Mishsky, Nurit Gal-Oz
, Ehud Gudes:
Computing domains reputation using flow. ICITST 2014: 426-431 - [c71]Libi Gur, Nurit Gal-Oz, Ehud Gudes:
Knots Maintenance for Optimal Management of Trust Relations. IFIPTM 2014: 189-204 - [e4]Jianying Zhou, Nurit Gal-Oz
, Jie Zhang, Ehud Gudes:
Trust Management VIII - 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings. IFIP Advances in Information and Communication Technology 430, Springer 2014, ISBN 978-3-662-43812-1 [contents] - 2013
- [c70]Nurit Gal-Oz
, Ehud Gudes:
Trust and reputation in and across virtual communities. EDBT 2013: 769-772 - 2012
- [j31]Tamir Tassa, Ehud Gudes:
Secure distributed computation of anonymized views of shared databases. ACM Trans. Database Syst. 37(2): 11:1-11:43 (2012) - [c69]Rami Sharon, Ehud Gudes:
Code Type Revealing Using Experiments Framework. DBSec 2012: 193-206 - 2011
- [j30]Jaideep Vaidya, Ehud Gudes:
Introduction. J. Comput. Secur. 19(3): 485-486 (2011) - [c68]Nurit Gal-Oz
, Tal Grinshpoun
, Ehud Gudes:
Privacy issues with sharing reputation across virtual communities. PAIS 2011: 3 - [c67]Yaron Gonen, Ehud Gudes:
Users tracking and roles mining in web-based applications. EDBT/ICDT Ph.D. Workshop 2011: 14-18 - [c66]Natalia Vanetik, Ehud Gudes:
HashMax: A New Method for Mining Maximal Frequent Itemsets. KDIR 2011: 140-145 - [c65]Nurit Gal-Oz, Ran Yahalom, Ehud Gudes:
Identifying Knots of Trust in Virtual Communities. IFIPTM 2011: 67-81 - [c64]Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz
, Erez Shmueli:
Tracking end-users in web databases. NSS 2011: 105-112 - [c63]Nurit Gal-Oz, Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli:
Mining Roles from Web Application Usage Patterns. TrustBus 2011: 125-137 - [c62]Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
A Method for Detecting Unknown Malicious Executables. TrustCom 2011: 190-196 - [c61]Lior Okman, Nurit Gal-Oz
, Yaron Gonen, Ehud Gudes, Jenny Abramov:
Security Issues in NoSQL Databases. TrustCom 2011: 541-547 - [e3]Ian Wakeman, Ehud Gudes, Christian Damsgaard Jensen, Jason Crampton:
Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings. IFIP Advances in Information and Communication Technology 358, Springer 2011, ISBN 978-3-642-22199-6 [contents] - 2010
- [j29]Nurit Gal-Oz
, Tal Grinshpoun, Ehud Gudes:
Privacy Issues with Sharing and Computing Reputation across Communities. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 16-34 (2010) - [j28]Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes:
Sharing Reputation Across Virtual Communities. J. Theor. Appl. Electron. Commer. Res. 5(2): 1-25 (2010) - [c60]Yaron Gonen, Nurit Gal-Oz, Ran Yahalom, Ehud Gudes:
CAMLS: A Constraint-Based Apriori Algorithm for Mining Long Sequences. DASFAA (1) 2010: 63-77 - [c59]Nurit Gal-Oz, Niv Gilboa, Ehud Gudes:
Schemes for Privately Computing Trust and Reputation. IFIPTM 2010: 1-16
2000 – 2009
- 2009
- [j27]Vladimir Lipets, Natalia Vanetik
, Ehud Gudes:
Subsea: an efficient heuristic algorithm for subgraph isomorphism. Data Min. Knowl. Discov. 19(3): 320-350 (2009) - [c58]Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein:
Methods for Computing Trust and Reputation While Preserving Privacy. DBSec 2009: 291-298 - [c57]Boris Rozenberg, Ehud Gudes, Yuval Elovici:
SISR - A New Model for Epidemic Spreading of Electronic Threats. ISC 2009: 242-249 - [c56]Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
Method for Detecting Unknown Malicious Executables. RAID 2009: 376-377 - [c55]Tal Grinshpoun
, Nurit Gal-Oz
, Amnon Meisels, Ehud Gudes:
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities. Web Intelligence 2009: 34-41 - [e2]Ehud Gudes, Jaideep Vaidya:
Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings. Lecture Notes in Computer Science 5645, Springer 2009, ISBN 978-3-642-03006-2 [contents] - 2008
- [c54]Alex Roichman, Ehud Gudes:
DIWeDa - Detecting Intrusions in Web Databases. DBSec 2008: 313-329 - [c53]Yosef Shatsky, Ehud Gudes:
TOPS: a new design for transactions in publish/subscribe middleware. DEBS 2008: 201-210 - [c52]Boris Rozenberg, Ehud Gudes, Yuval Elovici:
A Distributed Framework for the Detection of New Worm-Related Malware. EuroISI 2008: 179-190 - [c51]Nurit Gal-Oz, Ehud Gudes, Danny Hendler:
A Robust and Knot-Aware Trust-Based Reputation Model. IFIPTM 2008: 167-182 - 2007
- [c50]Luis Vargas, Lauri I. W. Pesonen, Ehud Gudes, Jean Bacon:
Transactions in Content-Based Publish/Subscribe Middleware. ICDCS Workshops 2007: 68 - [c49]Alex Roichman, Ehud Gudes:
Fine-grained access control to web databases. SACMAT 2007: 31-40 - 2006
- [j26]Natalia Vanetik
, Solomon Eyal Shimony, Ehud Gudes:
Support measures for graph data. Data Min. Knowl. Discov. 13(2): 243-260 (2006) - [j25]Boris Rozenberg, Ehud Gudes:
Association rules mining in vertically partitioned databases. Data Knowl. Eng. 59(2): 378-396 (2006) - [j24]Ehud Gudes, Solomon Eyal Shimony, Natalia Vanetik
:
Discovering Frequent Graph Patterns Using Disjoint Paths. IEEE Trans. Knowl. Data Eng. 18(11): 1441-1456 (2006) - [c48]Noa Tuval, Ehud Gudes:
Resolving Information Flow Conflicts in RBAC Systems. DBSec 2006: 148-162 - [c47]Alex Gurevich, Ehud Gudes:
Recent Research on Privacy Preserving Data Mining. ICISS 2006: 377-380 - [c46]Alex Gurevich, Ehud Gudes:
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. IDEAS 2006: 121-128 - 2005
- [c45]Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes:
Designing Secure Indexes for Encrypted Databases. DBSec 2005: 54-68 - [c44]Ehud Gudes, Alexander Pertsev:
Mining Module for Adaptive XML Path Indexing. DEXA Workshops 2005: 1015-1019 - [c43]Paz Biber, Ehud Gudes:
Using Relevant Sets for Optimizing XML Indexes. WEBIST 2005: 13-23 - 2004
- [c42]Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce:
Information Flow Analysis for File Systems and Databases Using Labels. DBSec 2004: 125-141 - [c41]Moti Cohen, Ehud Gudes:
Diagonally Subgraphs Pattern Mining. DMKD 2004: 51-58 - [c40]Natalia Vanetik
, Ehud Gudes:
Mining Frequent Labeled and Partially Labeled Graph Patterns. ICDE 2004: 91-102 - [c39]Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels:
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. ICICS 2004: 171-186 - [c38]Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes:
A Structure Preserving Database Encryption Scheme. Secure Data Management 2004: 28-40 - [c37]Lev-Arie Ratinov, Solomon Eyal Shimony, Ehud Gudes:
Probabilistic model for schema understanding and matching. SMC (5) 2004: 4768-4773 - [c36]Lev-Arie Ratinov, Ehud Gudes:
Abbreviation Expansion in Schema Matching and Web Integration. Web Intelligence 2004: 485-489 - 2003
- [j23]Rachel Ben-Eliyahu-Zohary, Ehud Gudes, Giovambattista Ianni:
Metaqueries: Semantics, complexity, and efficient algorithms. Artif. Intell. 149(1): 61-87 (2003) - [j22]Rachel Ben-Eliyahu-Zohary, Carmel Domshlak, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony:
FlexiMine - A Flexible Platform for KDD Research and Application Development. Ann. Math. Artif. Intell. 39(1-2): 175-204 (2003) - [c35]Ehud Gudes, Boris Rozenberg:
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. DBSec 2003: 91-104 - [c34]Alexander Binun, Ehud Gudes:
Policy and State Based Secure Wrapper and Its Application to Mobile Agents. LA-WEB 2003: 14-26 - [e1]Ehud Gudes, Sujeet Shenoi:
Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK. IFIP Conference Proceedings 256, Kluwer 2003, ISBN 1-4020-7541-3 [contents] - 2002
- [j21]Ehud Gudes, Aharon Tubman:
AutoWF - A secure Web workflow system using autonomous objects. Data Knowl. Eng. 43(1): 1-27 (2002) - [j20]Martin S. Olivier
, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. Data Knowl. Eng. 43(3): 281-292 (2002) - [c33]Ehud Gudes, Carmel Domshlak, Natalia Orlov:
Remote Conferencing with Multimedia Objects. EDBT Workshops 2002: 526-543 - [c32]Raghav Kaushik, Pradeep Shenoy, Philip Bohannon, Ehud Gudes:
Exploiting Local Similarity for Indexing Paths in Graph-Structured Data. ICDE 2002: 129-140 - [c31]Natalia Vanetik, Ehud Gudes, Solomon Eyal Shimony:
Computing Frequent Graph Patterns from Semistructured Data. ICDM 2002: 458-465 - [c30]Mira Balaban, Nikolai Berezansky, Ehud Gudes:
Answering Cooperative Recursive Queries in Web Federated Databases. NGITS 2002: 14-28 - 2000
- [c29]Rachel Ben-Eliyahu-Zohary, Ehud Gudes:
Meta-queries - Computation and Evaluation. DaWaK 2000: 265-275 - [c28]Martin S. Olivier
, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160
1990 – 1999
- 1999
- [j19]Ehud Gudes, Martin S. Olivier, Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace. J. Comput. Secur. 7(4): 287-315 (1999) - [j18]Natalija Krivokapic, Alfons Kemper, Ehud Gudes:
Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis. VLDB J. 8(2): 79-100 (1999) - [c27]Rachel Ben-Eliyahu-Zohary, Ehud Gudes:
Towards Efficient Metaquerying. IJCAI 1999: 800-805 - [c26]Amir Sapir, Ehud Gudes:
Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases. NGITS 1999: 94-111 - 1998
- [c25]Ehud Gudes, Martin S. Olivier:
Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107 - [c24]Martin S. Olivier, Reind P. van de Riet, Ehud Gudes:
Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351 - [c23]Amir Sapir, Ehud Gudes:
Dynamic Relationships and their Propagation Attributes in Object Oriented Databases. DEXA Workshop 1998: 967-974 - [c22]Carmel Domshlak, D. Gershkovich, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony:
FlexiMine - A Flexible Platform for KDD Research and Application Construction. KDD 1998: 184-188 - 1997
- [j17]Amnon Meisels, Jihad El-Sana, Ehud Gudes:
Decomposing and Solving Timetabling Constraint Networks. Comput. Intell. 13(4): 486-505 (1997) - [j16]Reind P. van de Riet, Andrea Junk, Ehud Gudes:
Security in Cyberspace: A Knowledge-Base Approach. Data Knowl. Eng. 24(1): 69-96 (1997) - [j15]Amnon Meisels, Ehud Gudes, Gadi Solotorevsky:
Combining rules and constraints for employee timetabling. Int. J. Intell. Syst. 12(6): 419-439 (1997) - [j14]