Ehud Gudes
Orcid: 0000-0002-4805-0651Affiliations:
- Ben-Gurion University, Beersheba, Israel
  According to our database1,
  Ehud Gudes
  authored at least 162 papers
  between 1973 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
- 
    on cs.bgu.ac.il
- 
    on dl.acm.org
On csauthors.net:
Bibliography
  2025
Predictive Enhancement of ABAC Policies Using Access Log Analytics [Work In Progress Paper].
    
  
    Proceedings of the 30th ACM Symposium on Access Control Models and Technologies, 2025
    
  
    Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
    
  
    Proceedings of the Data and Applications Security and Privacy XXXIX, 2025
    
  
  2024
GeniePool 2.0: advancing variant analysis through CHM13-T2T, AlphaMissense, gnomAD V4 integration, and variant co-occurrence queries.
    
  
    Database J. Biol. Databases Curation, January, 2024
    
  
    IEEE Trans. Cloud Comput., 2024
    
  
    Proceedings of the 17th ACM International Systems and Storage Conference, 2024
    
  
    Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2024
    
  
  2023
GeniePool: genomic database with corresponding annotated samples based on a cloud data lake architecture.
    
  
    Database J. Biol. Databases Curation, 2023
    
  
    Proceedings of the 16th ACM International Conference on Systems and Storage, 2023
    
  
    Proceedings of the Trust Management XIV, 2023
    
  
    Proceedings of the Trust Management XIV, 2023
    
  
    Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
    
  
  2022
    IEEE Trans. Big Data, 2022
    
  
    Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
    
  
    Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
    
  
    Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
    
  
  2021
Wavelet-based dynamic and privacy-preserving similitude data models for edge computing.
    
  
    Wirel. Networks, 2021
    
  
    Online Soc. Networks Media, 2021
    
  
    Proceedings of the SYSTOR '21: The 14th ACM International Systems and Storage Conference, 2021
    
  
Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model.
    
  
    Proceedings of the Network and System Security - 15th International Conference, 2021
    
  
    Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021
    
  
    Proceedings of the Workshops of the EDBT/ICDT 2021 Joint Conference, 2021
    
  
    Proceedings of the Data and Applications Security and Privacy XXXV, 2021
    
  
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
    
  
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
    
  
  2020
    Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
    
  
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
    
  
Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks.
    
  
    Proceedings of the Complex Networks & Their Applications IX, 2020
    
  
  2019
    IEEE Trans. Big Data, 2019
    
  
    Comput. Secur., 2019
    
  
A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks.
    
  
    Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
    
  
    Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
    
  
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility.
    
  
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
    
  
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
    
  
    Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
    
  
  2018
New and Efficient Algorithms for Producing Frequent Itemsets with the Map-Reduce Framework.
    
  
    Algorithms, 2018
    
  
    Proceedings of the Data and Applications Security and Privacy XXXII, 2018
    
  
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors.
    
  
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
    
  
Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation.
    
  
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
    
  
  2017
    Concurr. Comput. Pract. Exp., 2017
    
  
    Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
    
  
    Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
    
  
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases.
    
  
    Proceedings of the Data and Applications Security and Privacy XXXI, 2017
    
  
Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party.
    
  
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
    
  
    Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
    
  
    Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
    
  
    Proceedings of the Advances in Databases and Information Systems, 2017
    
  
  2016
Content sharing schemes in DRM systems with enhanced performance and privacy preservation.
    
  
    J. Comput. Secur., 2016
    
  
    Comput. Sci. Rev., 2016
    
  
    Proceedings of the Information Security Theory and Practice, 2016
    
  
    Proceedings of the 2016 IEEE International Conference on Software Science, 2016
    
  
    Proceedings of the Network and System Security - 10th International Conference, 2016
    
  
    Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
    
  
    Proceedings of the Data and Applications Security and Privacy XXX, 2016
    
  
    Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
    
  
  2015
    Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
    
  
    Proceedings of the Data and Applications Security and Privacy XXIX, 2015
    
  
  2014
    Comput. Secur., 2014
    
  
    Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
    
  
    Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
    
  
    Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
    
  
    Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
    
  
  2013
    Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
    
  
  2012
    ACM Trans. Database Syst., 2012
    
  
    Proceedings of the Data and Applications Security and Privacy XXVI, 2012
    
  
  2011
    Proceedings of the IEEE 10th International Conference on Trust, 2011
    
  
    Proceedings of the IEEE 10th International Conference on Trust, 2011
    
  
    Proceedings of the Trust, Privacy and Security in Digital Business, 2011
    
  
    Proceedings of the 5th International Conference on Network and System Security, 2011
    
  
    Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
    
  
HashMax: A New Method for Mining Maximal Frequent Itemsets.
  
    Proceedings of the KDIR 2011, 2011
    
  
    Proceedings of the 2011 Joint EDBT/ICDT Ph.D. Workshop, Uppsala, Sweden, March 25, 2011, 2011
    
  
    Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011
    
  
  2010
    J. Theor. Appl. Electron. Commer. Res., 2010
    
  
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
    
  
    Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
    
  
    Proceedings of the Database Systems for Advanced Applications, 2010
    
  
  2009
    Data Min. Knowl. Discov., 2009
    
  
    Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
    
  
    Proceedings of the Information Security, 12th International Conference, 2009
    
  
    Proceedings of the Data and Applications Security XXIII, 2009
    
  
  2008
    Proceedings of the Trust Management II, 2008
    
  
    Proceedings of the Intelligence and Security Informatics, 2008
    
  
    Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008
    
  
    Proceedings of the Data and Applications Security XXII, 2008
    
  
  2007
    Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
    
  
    Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007
    
  
  2006
    IEEE Trans. Knowl. Data Eng., 2006
    
  
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation.
    
  
    Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006
    
  
    Proceedings of the Information Systems Security, Second International Conference, 2006
    
  
    Proceedings of the Data and Applications Security XX, 2006
    
  
  2005
Using Relevant Sets for Optimizing XML Indexes.
  
    Proceedings of the WEBIST 2005, 2005
    
  
    Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
    
  
    Proceedings of the Data and Applications Security XIX, 2005
    
  
  2004
    Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004
    
  
    Proceedings of the IEEE International Conference on Systems, 2004
    
  
    Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
    
  
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.
    
  
    Proceedings of the Information and Communications Security, 6th International Conference, 2004
    
  
    Proceedings of the 20th International Conference on Data Engineering, 2004
    
  
    Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004
    
  
    Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
    
  
  2003
    Ann. Math. Artif. Intell., 2003
    
  
    Proceedings of the 1st Latin American Web Congress (LA-WEB 2003), 2003
    
  
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases.
    
  
    Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
    
  
  2002
    Data Knowl. Eng., 2002
    
  
    Proceedings of the Next Generation Information Technologies and Systems, 2002
    
  
    Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002
    
  
    Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002
    
  
    Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002
    
  
  2000
    Proceedings of the Data and Application Security, 2000
    
  
    Proceedings of the Data Warehousing and Knowledge Discovery, 2000
    
  
  1999
Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis.
    
  
    VLDB J., 1999
    
  
    J. Comput. Secur., 1999
    
  
Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases.
    
  
    Proceedings of the Next Generation Information Technologies and Systems, 1999
    
  
    Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999
    
  
  1998
    Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998
    
  
    Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
    
  
    Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
    
  
Security Policies in Replicated and Autonomous Databases.
  
    Proceedings of the Database Security XII: Status and Prospects, 1998
    
  
  1997
    Int. J. Intell. Syst., 1997
    
  
A compile-time model for safe information flow in object-oriented databases.
  
    Proceedings of the Information Security in Research and Business, 1997
    
  
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
  
    Proceedings of the Database Securty XI: Status and Prospects, 1997
    
  
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases.
  
    Proceedings of the Database Securty XI: Status and Prospects, 1997
    
  
Solving a Real-life Nurses Time Tabling and Transportation Problem Using Distributed CSP Techniques.
  
    Proceedings of the Constraints & Agents: Collected Papers from the 1997 AAAI Workshop, 1997
    
  
  1996
    Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996
    
  
An Object-Oriented Database Architecture for Providing Securty in Cyberspace.
  
    Proceedings of the Database Security Volume X, 1996
    
  
    Proceedings of the Second International Conference on Principles and Practice of Constraint Programming, 1996
    
  
    Proceedings of the Third International Conference on Artificial Intelligence Planning Systems, 1996
    
  
  1995
Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach.
    
  
    Proceedings of the Practice and Theory of Automated Timetabling, First International Conference, Edinburgh, UK, August 29, 1995
    
  
TRAPS - A Time Dependent Resource Allocation Language.
  
    Proceedings of the Next Generation Information Technologies and Systems (NGITS '95), 1995
    
  
  1994
    IEEE Trans. Knowl. Data Eng., 1994
    
  
    IEEE Trans. Knowl. Data Eng., 1994
    
  
  1993
    Proceedings of the 19th International Conference on Very Large Data Bases, 1993
    
  
A Method-Based Authorization Model for Object-Oriented Databases.
  
    Proceedings of the Security for Object-Oriented Systems, 1993
    
  
  1991
    Knowl. Based Syst., 1991
    
  
  1990
    Proceedings of the Third International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 1990, July 15-18, 1990, The Mills House Hotel, Charleston, SC, USA, 1990
    
  
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases.
  
    Proceedings of the Database Security, 1990
    
  
  1989
    Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
    
  
    Proceedings of the Foundations of Data Organization and Algorithms, 1989
    
  
Security Policies in Object-Oriented Databases.
  
    Proceedings of the Database Security, 1989
    
  
  1988
    IEEE Micro, 1988
    
  
    Inf. Syst., 1988
    
  
  1987
  1984
    IEEE Trans. Software Eng., 1984
    
  
  1982
  1981
An Extended Entity-Relationship Model with Multi Level External Views.
  
    Proceedings of the Entity-Relationship Approach to Information Modeling and Analysis, 1981
    
  
  1980
    IEEE Trans. Software Eng., 1980
    
  
    Proceedings of the 1980 ACM SIGMOD International Conference on Management of Data, 1980
    
  
  1979
A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System".
  
    Commun. ACM, 1979
    
  
    Proceedings of the IEEE Computer Society's Third International Computer Software and Applications Conference, 1979
    
  
  1978
Storage Allocation for Access Path Minimization in Network Structured Data Bases.
  
    Proceedings of the International Conference on Databases: Improving Usability and Responiveness, 1978
    
  
  1977
  1976
    Proceedings of the American Federation of Information Processing Societies: 1976 National Computer Conference, 1976
    
  
  1973