Ehud Gudes - Recent publications
- 2009
- Data and Applications Security XXIII
Ehud Gudes, Jaideep Vaidya,23rd Annual IFIP WG 11.3 Working Conference, Montreal , Canada, July 12-15, 2009.
Proceedings Springer 2009 .
-
Subsea: an efficient heuristic algorithm for subgraph isomorphism
V. Lipets , N. Vanetik and E. Gudes,
Data Mining and Knowledge Discovery, Volume 19, Number 3, December, 2009.
-
Methods for Computing Trust and Reputation While Preserving Privacy
Ehud Gudes, Nurith Gal-Oz, Alon Grubshtein;DBSec 2009: 291-298
-
SISR - A New Model for Epidemic Spreading of Electronic Threats
Boris Rozenberg, Ehud Gudes, Yuval Elovici; ISC 2009: 242-249
-
Method for Detecting Unknown Malicious Executables
Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel;RAID 2009: 376-377
-
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities
Tal Grinshpoun, Nurit Gal-Oz, Amnon Meisels, Ehud Gudes;2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence
- 2008
-
A Robust and Knot- Aware Trust-Based Reputation Model
Nurit Gal-Oz, Ehud Gudes, Danny Hendler; Proceedings of IFIPTM 2008, Trondheim, Norway, 2008
-
DIWeDa - Detecting Intrusions in Web Databases.
Alex Roichman, Ehud Gudes; DBSec 2008: 313-329
-
TOPS: a new design for transactions in publish/subscribe middleware
Yosef Shatsky, Ehud Gudes, Ehud Gudes;DEBS 2008: 201-210
-
A Distributed Framework for the Detection of New Worm-Related Malware.
Boris Rozenberg, Ehud Gudes, Yuval Elovici ; EuroISI 2008: 179-190
- 2007
-
Transactions in Content-Based Publish/Subscribe Middleware
Luis Vargas, Lauri I. W. Pesonen, Ehud Gudes, Jean Bacon ; ICDCS Workshops 2007: 68
-
Fine-grained access control to web databases.
Alex Roichman, Ehud Gudes ; SACMAT 2007: 31-40
- 2006
-
Resolving Information Flow Conflicts in RBAC Systems.
Noa Tuval, Ehud Gudes ; DBSec 2006: 148-162
-
Recent Research on Privacy Preserving Data Mining.
Alex Gurevich, Ehud Gudes ; ICISS 2006: 377-380
-
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation
Alex Gurevich, Ehud Gudes ; IDEAS 2006: 121-128
-
Association rules mining in vertically partitioned databases.
Boris Rozenberg, Ehud Gudes ; Data Knowl. Eng. 59(2): 378-396 (2006)
-
Support measures for graph data.
Natalia Vanetik, Solomon Eyal Shimony, Ehud Gudes ; Data Min. Knowl. Discov. 13(2): 243-260 (2006)
-
Discovering Frequent Graph Patterns Using Disjoint Paths
Ehud Gudes, Solomon Eyal Shimony, Natalia Vanetik ; IEEE Trans. Knowl. Data Eng. 18(11): 1441-1456 (2006)
- 2005
-
Designing Secure Indexes for Encrypted Databases.
Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes ; DBSec 2005: 54-68
-
Mining Module for Adaptive XML Path Indexing
Ehud Gudes, Alexander Pertsev ; DEXA Workshops 2005: 1015-1019
-
Using Relevant Sets for Optimizing XML Indexes
Paz Biber, Ehud Gudes ; WEBIST 2005: 13-23
- 2004
-
Information flow analysis for file systems and databases using Labels. E. Gudes,
L.V. Mancini, F. Parisi-Presicce, Proceedings, IFIP WG11.3 Int. Conference
on Data and Application security, Sitges, Spain, July, 2004.
- A Structure
Preserving Database Encryption Scheme. Y. Elovici, E. Shmueli, R.
Waisenberg, E. Gudes, proceedings SDM04/VLDB04, Toronto, Canada, 2004
- Abbreviation
Expansion in Schema Matching and Web Integration. L.Ratinov, E. Gudes,
IEEE/WIC/ACM WI-IAT'04.
- Mining
Frequent Labeled and Partially Labeled Graph Patterns. N. Vanetik,
E. Gudes, ICDE 2004: 91-102
- Diagonally
Subgraphs Pattern Mining. M.Cohen, E.Gudes, DMKD 2004: 51-58
- Probabilistic Semantics for Schema Matching
. L.Ratinov, S.E.Shimony,E.Gudes , SMC, 2004 IEEE International Conference on Systems, Man & Cybernetics.
-
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet
Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels ; ICICS 2004: 171-186
- 2003
- Collaborative Privacy Preserving
Data Mining in Vertically Partitioned Databases. B. Rozenberg, E.
Gudes, 7th Annual IFIP WG 11.3 Working Conference on Database and Applications
Security, Colorado, U.S.A.,2003
- Metaqueries:
Semantics, complexity, and efficient algorithms. R. Ben-Eliyahu-Zohary,
E. Gudes, G. Ianni,Artif. Intell. 149(1): 61-87 (2003)
-
FlexiMine - A Flexible Platform for KDD Research and Application Development.
Rachel Ben-Eliyahu-Zohary, Carmel Domshlak, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony ; Ann. Math. Artif. Intell. 39(1-2): 175-204 (2003)
- 2002
- AutoWF
- A secure Web workflow system using autonomous objects. E. Gudes,
A. Tubman, Data Knowl. Eng. 43(1): 1-27 (2002)
- Computing Frequent
Graph Patterns from Semistructured Data. N. Vanetik, E. Gudes,
S.E. Shimony, ICDM 2002: 458-465
- Remote Conferencing
with Multimedia Objects. E. Gudes, C. Domshlak, N. Orlov, EDBT Workshops
2002: 526-543
- Answering
Cooperative Recursive Queries in Web Federated Databases. M. Balaban,
N. Berezansky, E. Gudes, NGITS 2002: 14-28
- Exploiting
Local Similarity for Indexing Paths in Graph-Structured Data . R.
Kaushik, P. Shenoy, P. Bohannon, E. Gudes, ICDE 2002: 129-140
- Wrappers -
A Mechanism to Support State-based Authorisation in Web Applications
M. Olivier and E. Gudes; Data Knowl. Eng. 43(3): 281-292 (2002)
- 2000
-
Meta-queries - Computation and Evaluation
Rachel Ben-Eliyahu-Zohary, Ehud Gudes ; DaWaK 2000: 265-275
- 1999
-
Deadlock detection in distributed database systems: a new algorithm and
a comparative performance analysis N. Krivokapic , A. Kemper and
E. GudesThe VLDB Journal, Volume 8, Issue 2, 1999,
pp 79-100.
- Dynamic relationships
and their propagation and Concurren cy semantics in Object-oriented databases
Sapir A. and E. Gudes,Proceedings, 4th NGITS conference, July, 1999, pp.
94-111
- Towards Efficient
Meta-querying.Ben-Eliahu, R and E. Gudes,Proceedings, IJCAI-99,
Stockholm, Sweden, 1999, pp. 800-805.
- 1998
- FlexiMine
- A Flexible Platform for KDD C. Domshlak, D. Gershkovich, E. Gudes,
N. Liusternik, A. Meisels, T. Rosen, and S. E. Shimony,Proceedings, KDD
Int. Conference, NYC, 1998. Also, Technical Report FC-98-04, Math. and CS
Dept, Ben-Gurion University, 1998.
-
Security Policies in Replicated and Autonomous Databases
Ehud Gudes, Martin S. Olivier ; DBSec 1998: 93-107
- Specifying Application-Level Security in Workflow Systems. M.
S. Olivier, R. P. van de Riet, E. Gudes, DEXA Workshop 1998: 346-351
- Dynamic Relationships and their Propagation Attributes in Object Oriented
Databases. A. Sapir, E. Gudes, DEXA Workshop 1998:967-974
- 1997
- A Uniform Indexing
Scheme for Object-Oriented Databases. E. Gudes, Information
Systems, Vol 22, #4, 1997.
- Combining
Rules and Constraints for Employee Timetabling. A. Meisels,
E. Gudes and G. Solotorevsky. Intelligent Systems, Vol. 12, No.
6, June, 1997, pp. 419-439.
- Security
in Cyberspace - A Knowledge-based Approach. R. van de Riet, E. Gudes,
Knowledge & Data Engineering, Vol. 24, 1997, pp 69-96.
- A Compile-Time Flow
Analysis of Transactions and Methods in Object-Oriented Databases
M. Gendler-Fishman, E. Gudes, DBSec 1997: 110-133
- A Compile-Time
Model for Safe Information Flow in Object-Oriented Databases. M.Gendler-Fishman,
E. Gudes, SEC 1997: 41-55
- 1994
- A Model for Evaluation and Administration of Security in Object-Oriented Databases,
E.B. Fernandez, E. Gudes, H. Song, IEEE Trans. on Knowledge and Data
Engineering, April, 1994, pp. 275-292.
- RAPS: A Rule-Based Language for Specifying Resource Allocation and
Time-Tabling Problems. G. Solotorevsky, E. Gudes and A. Meisels.
IEEE Transactions on Knowledge and Data Engineering,
Volume 6, pp. 681-698, 1994.