Ehud Gudes

Orcid: 0000-0003-0687-086X

Affiliations:
  • Ben-Gurion University, Beersheba, Israel


According to our database1, Ehud Gudes authored at least 154 papers between 1973 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automatic Real-Time Platoon Formation Using the Road Graph.
SN Comput. Sci., January, 2024

Optimizing Cloud Data Lake Queries With a Balanced Coverage Plan.
IEEE Trans. Cloud Comput., 2024

2023
GeniePool: genomic database with corresponding annotated samples based on a cloud data lake architecture.
Database J. Biol. Databases Curation, 2023

Analyzing large-scale genomic data with cloud data lakes.
Proceedings of the 16th ACM International Conference on Systems and Storage, 2023

A Survey of Security Challenges in Automatic Identification System (AIS) Protocol.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
Efficient and Privacy Preserving Approximation of Distributed Statistical Queries.
IEEE Trans. Big Data, 2022

Fake News Detection in Social Networks Using Machine Learning and Trust.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

Non-stopping Junctions via Traffic Scheduling.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

BFLUT Bloom Filter for Private Look Up Tables.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
Wavelet-based dynamic and privacy-preserving similitude data models for edge computing.
Wirel. Networks, 2021

A Trust based Privacy Providing Model for Online Social Networks.
Online Soc. Networks Media, 2021

Indexing cloud data lakes within the lakes.
Proceedings of the SYSTOR '21: The 14th ACM International Systems and Storage Conference, 2021

Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model.
Proceedings of the Network and System Security - 15th International Conference, 2021

Needle in a haystack queries in cloud data lakes.
Proceedings of the Workshops of the EDBT/ICDT 2021 Joint Conference, 2021

An ABAC Model with Trust and Gossiping (ABAC-TG) for Online Social Networks.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Implementing GDPR in Social Networks Using Trust and Context.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Use of Blockchain for Ensuring Data Integrity in Cloud Databases.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
PUA Detection Based on Bundle Installer Characteristics.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Comparison of DNS Based Methods for Detecting Malicious Domains.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks.
Proceedings of the Complex Networks & Their Applications IX, 2020

2019
A Survey on Geographically Distributed Big-Data Processing Using MapReduce.
IEEE Trans. Big Data, 2019

Mining meaningful and rare roles from web application usage patterns.
Comput. Secur., 2019

A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

An MST-based information flow model for security in Online Social Networks.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

MLDStore - DNNs as Similitude Models for Sharing Big Data (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Deep Neural Networks as Similitude Models for Sharing Big Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Sharing-habits based privacy control in social networks.
J. Comput. Secur., 2018

New and Efficient Algorithms for Producing Frequent Itemsets with the Map-Reduce Framework.
Algorithms, 2018

Data Integrity Verification in Column-Oriented NoSQL Databases.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

2017
Bypassing system calls-based intrusion detection systems.
Concurr. Comput. Pract. Exp., 2017

Advanced Flow Models for Computing the Reputation of Internet Domains.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Secure Protocol of ABAC Certificates Revocation and Delegation.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Efficient and private approximations of distributed databases calculations.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Incremental Frequent Itemsets Mining with MapReduce.
Proceedings of the Advances in Databases and Information Systems, 2017

2016
Content sharing schemes in DRM systems with enhanced performance and privacy preservation.
J. Comput. Secur., 2016

Security and privacy aspects in MapReduce on clouds: A survey.
Comput. Sci. Rev., 2016

Attacking and Defending Dynamic Analysis System-Calls Based IDS.
Proceedings of the Information Security Theory and Practice, 2016

An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

Evading System-Calls Based Intrusion Detection Systems.
Proceedings of the Network and System Security - 10th International Conference, 2016

Trust-based Dynamic RBAC.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Concise essence-preserving big data representation.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Reputation - from Social Perception to Internet Security.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

A Topology Based Flow Model for Computing Domain Reputation.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Implementing a database encryption solution, design and implementation issues.
Comput. Secur., 2014

Monotonic qualitative logic programs: Computation and applications.
AI Commun., 2014

Knots Maintenance for Optimal Management of Trust Relations.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Computing domains reputation using flow.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Contexto: lessons learned from mobile context inference.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Efficient and Enhanced Solutions for Content Sharing in DRM Systems.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Trust and reputation in and across virtual communities.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
Secure distributed computation of anonymized views of shared databases.
ACM Trans. Database Syst., 2012

Code Type Revealing Using Experiments Framework.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
Introduction.
J. Comput. Secur., 2011

Security Issues in NoSQL Databases.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Mining Roles from Web Application Usage Patterns.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Tracking end-users in web databases.
Proceedings of the 5th International Conference on Network and System Security, 2011

Identifying Knots of Trust in Virtual Communities.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

HashMax: A New Method for Mining Maximal Frequent Itemsets.
Proceedings of the KDIR 2011, 2011

Users tracking and roles mining in web-based applications.
Proceedings of the 2011 Joint EDBT/ICDT Ph.D. Workshop, Uppsala, Sweden, March 25, 2011, 2011

Privacy issues with sharing reputation across virtual communities.
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011

2010
Sharing Reputation Across Virtual Communities.
J. Theor. Appl. Electron. Commer. Res., 2010

Privacy Issues with Sharing and Computing Reputation across Communities.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Schemes for Privately Computing Trust and Reputation.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

CAMLS: A Constraint-Based Apriori Algorithm for Mining Long Sequences.
Proceedings of the Database Systems for Advanced Applications, 2010

2009
Subsea: an efficient heuristic algorithm for subgraph isomorphism.
Data Min. Knowl. Discov., 2009

CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Method for Detecting Unknown Malicious Executables.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

SISR - A New Model for Epidemic Spreading of Electronic Threats.
Proceedings of the Information Security, 12th International Conference, 2009

Methods for Computing Trust and Reputation While Preserving Privacy.
Proceedings of the Data and Applications Security XXIII, 2009

2008
A Robust and Knot-Aware Trust-Based Reputation Model.
Proceedings of the Trust Management II, 2008

A Distributed Framework for the Detection of New Worm-Related Malware.
Proceedings of the Intelligence and Security Informatics, 2008

TOPS: a new design for transactions in publish/subscribe middleware.
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008

DIWeDa - Detecting Intrusions in Web Databases.
Proceedings of the Data and Applications Security XXII, 2008

2007
Fine-grained access control to web databases.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Transactions in Content-Based Publish/Subscribe Middleware.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2006
Discovering Frequent Graph Patterns Using Disjoint Paths.
IEEE Trans. Knowl. Data Eng., 2006

Association rules mining in vertically partitioned databases.
Data Knowl. Eng., 2006

Support measures for graph data.
Data Min. Knowl. Discov., 2006

Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Recent Research on Privacy Preserving Data Mining.
Proceedings of the Information Systems Security, Second International Conference, 2006

Resolving Information Flow Conflicts in RBAC Systems.
Proceedings of the Data and Applications Security XX, 2006

2005
Using Relevant Sets for Optimizing XML Indexes.
Proceedings of the WEBIST 2005, 2005

Mining Module for Adaptive XML Path Indexing.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Designing Secure Indexes for Encrypted Databases.
Proceedings of the Data and Applications Security XIX, 2005

2004
Abbreviation Expansion in Schema Matching and Web Integration.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Probabilistic model for schema understanding and matching.
Proceedings of the IEEE International Conference on Systems, 2004

A Structure Preserving Database Encryption Scheme.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Mining Frequent Labeled and Partially Labeled Graph Patterns.
Proceedings of the 20th International Conference on Data Engineering, 2004

Diagonally Subgraphs Pattern Mining.
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004

Information Flow Analysis for File Systems and Databases Using Labels.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
FlexiMine - A Flexible Platform for KDD Research and Application Development.
Ann. Math. Artif. Intell., 2003

Metaqueries: Semantics, complexity, and efficient algorithms.
Artif. Intell., 2003

Policy and State Based Secure Wrapper and Its Application to Mobile Agents.
Proceedings of the 1st Latin American Web Congress (LA-WEB 2003), 2003

Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
Wrappers - a mechanism to support state-based authorisation in Web applications.
Data Knowl. Eng., 2002

AutoWF - A secure Web workflow system using autonomous objects.
Data Knowl. Eng., 2002

Answering Cooperative Recursive Queries in Web Federated Databases.
Proceedings of the Next Generation Information Technologies and Systems, 2002

Computing Frequent Graph Patterns from Semistructured Data.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

Exploiting Local Similarity for Indexing Paths in Graph-Structured Data.
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002

Remote Conferencing with Multimedia Objects.
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002

2000
Meta-queries - Computation and Evaluation.
Proceedings of the Data Warehousing and Knowledge Discovery, 2000

1999
Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis.
VLDB J., 1999

Modeling, Specifying and Implementing Workflow Security in Cyberspace.
J. Comput. Secur., 1999

Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases.
Proceedings of the Next Generation Information Technologies and Systems, 1999

Towards Efficient Metaquerying.
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999

1998
FlexiMine - A Flexible Platform for KDD Research and Application Construction.
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998

Dynamic Relationships and their Propagation Attributes in Object Oriented Databases.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

Specifying Application-Level Security in Workflow Systems.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

Security Policies in Replicated and Autonomous Databases.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
A Uniform Indexing Scheme for Object-Oriented Databases.
Inf. Syst., 1997

Combining rules and constraints for employee timetabling.
Int. J. Intell. Syst., 1997

Security in Cyberspace: A Knowledge-Base Approach.
Data Knowl. Eng., 1997

Decomposing and Solving Timetabling Constraint Networks.
Comput. Intell., 1997

A compile-time model for safe information flow in object-oriented databases.
Proceedings of the Information Security in Research and Business, 1997

Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Solving a Real-life Nurses Time Tabling and Transportation Problem Using Distributed CSP Techniques.
Proceedings of the Constraints & Agents: Collected Papers from the 1997 AAAI Workshop, 1997

1996
An Object-Oriented Database Architecture for Providing Securty in Cyberspace.
Proceedings of the Database Security Volume X, 1996

Modeling and Solving Distributed Constraint Satisfaction Problems (DCSPs).
Proceedings of the Second International Conference on Principles and Practice of Constraint Programming, 1996

Algorithms for Solving Distributed Constraint Satisfaction Problems (DCSPs).
Proceedings of the Third International Conference on Artificial Intelligence Planning Systems, 1996

1995
Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach.
Proceedings of the Practice and Theory of Automated Timetabling, First International Conference, Edinburgh, UK, August 29, 1995

TRAPS - A Time Dependent Resource Allocation Language.
Proceedings of the Next Generation Information Technologies and Systems (NGITS '95), 1995

1994
RAPS: A Rule-Based Language for Specifying Resource Allocation and Time-Tabling.
IEEE Trans. Knowl. Data Eng., 1994

A Model for Evaluation and Administration of Security in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 1994

1993
A Model of Methods Access Authorization in Object-oriented Databases.
Proceedings of the 19th International Conference on Very Large Data Bases, 1993

A Method-Based Authorization Model for Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993

1991
Limited-resource scheduling by generalized rule-based system.
Knowl. Based Syst., 1991

1990
An Expert Systems Based Methodology for Solving Resource Allocation Problems.
Proceedings of the Third International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 1990, July 15-18, 1990, The Mills House Hotel, Charleston, SC, USA, 1990

Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases.
Proceedings of the Database Security, 1990

1989
A Security Model for Object-Oriented Databases.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

A Distributed Locking Algorithm for A Transactions System in Flat Concurrent Prolog.
Proceedings of the Foundations of Data Organization and Algorithms, 1989

Security Policies in Object-Oriented Databases.
Proceedings of the Database Security, 1989

1988
Software fault tolerance in architectures with hierarchical protection levels.
IEEE Micro, 1988

GISD: a graphical interactive system for conceptual database design.
Inf. Syst., 1988

1987
GCI-A Tool for Developing Interactive CAD User Interfaces.
Softw. Pract. Exp., 1987

1984
A Unifying Approach to the Design of a Secure Database Operating System.
IEEE Trans. Software Eng., 1984

1982
A new model for data base abstraction.
Inf. Syst., 1982

1981
An Extended Entity-Relationship Model with Multi Level External Views.
Proceedings of the Entity-Relationship Approach to Information Modeling and Analysis, 1981

1980
The Design of a Cryptopgraphy Based Secure File System.
IEEE Trans. Software Eng., 1980

Experiments with B-Tree Reorganization.
Proceedings of the 1980 ACM SIGMOD International Conference on Management of Data, 1980

1979
Security in a Multi-Level Structured Model of a Data Base.
Comput. J., 1979

A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System".
Commun. ACM, 1979

Design and implementation of a query command language using transition networks.
Proceedings of the IEEE Computer Society's Third International Computer Software and Applications Conference, 1979

1978
Storage Allocation for Access Path Minimization in Network Structured Data Bases.
Proceedings of the International Conference on Databases: Improving Usability and Responiveness, 1978

1977
Teaching data base systems using Date and Computing Surveys.
SIGMOD Rec., 1977

1976
The application of cryptography for data base security.
Proceedings of the American Federation of Information Processing Societies: 1976 National Computer Conference, 1976

1973
On Evaluating Boolean Expressions.
Softw. Pract. Exp., 1973


  Loading...