Ehud Gudes
Orcid: 0000-0003-0687-086XAffiliations:
- Ben-Gurion University, Beersheba, Israel
According to our database1,
Ehud Gudes
authored at least 154 papers
between 1973 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.bgu.ac.il
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
SN Comput. Sci., January, 2024
IEEE Trans. Cloud Comput., 2024
2023
GeniePool: genomic database with corresponding annotated samples based on a cloud data lake architecture.
Database J. Biol. Databases Curation, 2023
Proceedings of the 16th ACM International Conference on Systems and Storage, 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
2022
IEEE Trans. Big Data, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
2021
Wavelet-based dynamic and privacy-preserving similitude data models for edge computing.
Wirel. Networks, 2021
Online Soc. Networks Media, 2021
Proceedings of the SYSTOR '21: The 14th ACM International Systems and Storage Conference, 2021
Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the Workshops of the EDBT/ICDT 2021 Joint Conference, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks.
Proceedings of the Complex Networks & Their Applications IX, 2020
2019
IEEE Trans. Big Data, 2019
Comput. Secur., 2019
A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
New and Efficient Algorithms for Producing Frequent Itemsets with the Map-Reduce Framework.
Algorithms, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the Advances in Databases and Information Systems, 2017
2016
Content sharing schemes in DRM systems with enhanced performance and privacy preservation.
J. Comput. Secur., 2016
Comput. Sci. Rev., 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 2016 IEEE International Conference on Software Science, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
2014
Comput. Secur., 2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
2012
ACM Trans. Database Syst., 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
HashMax: A New Method for Mining Maximal Frequent Itemsets.
Proceedings of the KDIR 2011, 2011
Proceedings of the 2011 Joint EDBT/ICDT Ph.D. Workshop, Uppsala, Sweden, March 25, 2011, 2011
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011
2010
J. Theor. Appl. Electron. Commer. Res., 2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
Proceedings of the Database Systems for Advanced Applications, 2010
2009
Data Min. Knowl. Discov., 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the Trust Management II, 2008
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008
Proceedings of the Data and Applications Security XXII, 2008
2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007
2006
IEEE Trans. Knowl. Data Eng., 2006
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Data and Applications Security XX, 2006
2005
Using Relevant Sets for Optimizing XML Indexes.
Proceedings of the WEBIST 2005, 2005
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004
Proceedings of the IEEE International Conference on Systems, 2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the 20th International Conference on Data Engineering, 2004
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Ann. Math. Artif. Intell., 2003
Proceedings of the 1st Latin American Web Congress (LA-WEB 2003), 2003
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
Data Knowl. Eng., 2002
Data Knowl. Eng., 2002
Proceedings of the Next Generation Information Technologies and Systems, 2002
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002
2000
Proceedings of the Data Warehousing and Knowledge Discovery, 2000
1999
Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis.
VLDB J., 1999
J. Comput. Secur., 1999
Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases.
Proceedings of the Next Generation Information Technologies and Systems, 1999
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999
1998
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
Security Policies in Replicated and Autonomous Databases.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
Int. J. Intell. Syst., 1997
A compile-time model for safe information flow in object-oriented databases.
Proceedings of the Information Security in Research and Business, 1997
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Solving a Real-life Nurses Time Tabling and Transportation Problem Using Distributed CSP Techniques.
Proceedings of the Constraints & Agents: Collected Papers from the 1997 AAAI Workshop, 1997
1996
An Object-Oriented Database Architecture for Providing Securty in Cyberspace.
Proceedings of the Database Security Volume X, 1996
Proceedings of the Second International Conference on Principles and Practice of Constraint Programming, 1996
Proceedings of the Third International Conference on Artificial Intelligence Planning Systems, 1996
1995
Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach.
Proceedings of the Practice and Theory of Automated Timetabling, First International Conference, Edinburgh, UK, August 29, 1995
TRAPS - A Time Dependent Resource Allocation Language.
Proceedings of the Next Generation Information Technologies and Systems (NGITS '95), 1995
1994
IEEE Trans. Knowl. Data Eng., 1994
IEEE Trans. Knowl. Data Eng., 1994
1993
Proceedings of the 19th International Conference on Very Large Data Bases, 1993
A Method-Based Authorization Model for Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993
1991
Knowl. Based Syst., 1991
1990
Proceedings of the Third International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 1990, July 15-18, 1990, The Mills House Hotel, Charleston, SC, USA, 1990
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases.
Proceedings of the Database Security, 1990
1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Proceedings of the Foundations of Data Organization and Algorithms, 1989
Security Policies in Object-Oriented Databases.
Proceedings of the Database Security, 1989
1988
IEEE Micro, 1988
Inf. Syst., 1988
1987
1984
IEEE Trans. Software Eng., 1984
1982
1981
An Extended Entity-Relationship Model with Multi Level External Views.
Proceedings of the Entity-Relationship Approach to Information Modeling and Analysis, 1981
1980
IEEE Trans. Software Eng., 1980
Proceedings of the 1980 ACM SIGMOD International Conference on Management of Data, 1980
1979
A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System".
Commun. ACM, 1979
Proceedings of the IEEE Computer Society's Third International Computer Software and Applications Conference, 1979
1978
Storage Allocation for Access Path Minimization in Network Structured Data Bases.
Proceedings of the International Conference on Databases: Improving Usability and Responiveness, 1978
1977
1976
Proceedings of the American Federation of Information Processing Societies: 1976 National Computer Conference, 1976
1973