The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ehud Gudes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eduardo B. Fernández, Ehud Gudes, Haiyan Song
    A Model for Evaluation and Administration of Security in Object-Oriented Databases. [Citation Graph (7, 20)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1994, v:6, n:2, pp:275-292 [Journal]
  2. Ehud Gudes, Haiyan Song, Eduardo B. Fernández
    Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1990, pp:85-98 [Conf]
  3. María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández
    Security Policies in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1989, pp:257-268 [Conf]
  4. Nurith Gal-Oz, Ehud Gudes, Eduardo B. Fernández
    A Model of Methods Access Authorization in Object-oriented Databases. [Citation Graph (2, 9)][DBLP]
    VLDB, 1993, pp:52-61 [Conf]
  5. Peretz Shoval, Ehud Gudes, Moshe Goldstein
    GISD: a graphical interactive system for conceptual database design. [Citation Graph (2, 0)][DBLP]
    Inf. Syst., 1988, v:13, n:1, pp:81-95 [Journal]
  6. David L. Spooner, Ehud Gudes
    A Unifying Approach to the Design of a Secure Database Operating System. [Citation Graph (2, 0)][DBLP]
    IEEE Trans. Software Eng., 1984, v:10, n:3, pp:310-319 [Journal]
  7. Prabuddha De, Arun Sen, Ehud Gudes
    An Extended Entity-Relationship Model with Multi Level External Views. [Citation Graph (1, 12)][DBLP]
    ER, 1981, pp:455-472 [Conf]
  8. Ehud Gudes
    A Uniform Indexing Scheme for Object-Oriented Databases. [Citation Graph (1, 6)][DBLP]
    ICDE, 1996, pp:238-246 [Conf]
  9. Rachel Ben-Eliyahu-Zohary, Ehud Gudes
    Towards Efficient Metaquerying. [Citation Graph (1, 0)][DBLP]
    IJCAI, 1999, pp:800-805 [Conf]
  10. Carmel Domshlak, D. Gershkovich, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony
    FlexiMine - A Flexible Platform for KDD Research and Application Construction. [Citation Graph (1, 0)][DBLP]
    KDD, 1998, pp:184-188 [Conf]
  11. Amir Sapir, Ehud Gudes
    Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    NGITS, 1999, pp:94-111 [Conf]
  12. Ehud Gudes, Shalom Tsur
    Experiments with B-Tree Reorganization. [Citation Graph (1, 5)][DBLP]
    SIGMOD Conference, 1980, pp:200-206 [Conf]
  13. Eduardo B. Fernández, Ehud Gudes, Haiyan Song
    A Security Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:110-115 [Conf]
  14. Ehud Gudes, A. Reiter
    On Evaluating Boolean Expressions. [Citation Graph (1, 0)][DBLP]
    Softw., Pract. Exper., 1973, v:3, n:4, pp:345-350 [Journal]
  15. Ehud Gudes
    The Design of a Cryptopgraphy Based Secure File System. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1980, v:6, n:5, pp:411-420 [Journal]
  16. Gadi Solotorevsky, Ehud Gudes
    Algorithms for Solving Distributed Constraint Satisfaction Problems (DCSPs). [Citation Graph (0, 0)][DBLP]
    AIPS, 1996, pp:191-198 [Conf]
  17. Gadi Solotorevsky, Ehud Gudes, Amnon Meisels
    Modeling and Solving Distributed Constraint Satisfaction Problems (DCSPs). [Citation Graph (0, 0)][DBLP]
    CP, 1996, pp:561-562 [Conf]
  18. Rachel Ben-Eliyahu-Zohary, Ehud Gudes
    Meta-queries - Computation and Evaluation. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2000, pp:265-275 [Conf]
  19. Masha Gendler-Fishman, Ehud Gudes
    Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:110-133 [Conf]
  20. Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce
    Information Flow Analysis for File Systems and Databases Using Labels. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:125-141 [Conf]
  21. Ehud Gudes, Martin S. Olivier
    Security Policies in Replicated and Autonomous Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:93-107 [Conf]
  22. Ehud Gudes, Boris Rozenberg
    Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:91-104 [Conf]
  23. Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier
    Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:182-195 [Conf]
  24. Martin S. Olivier, Ehud Gudes
    Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:149-160 [Conf]
  25. Reind P. van de Riet, Ehud Gudes
    An Object-Oriented Database Architecture for Providing Securty in Cyberspace. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:120-144 [Conf]
  26. Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes
    Designing Secure Indexes for Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:54-68 [Conf]
  27. Noa Tuval, Ehud Gudes
    Resolving Information Flow Conflicts in RBAC Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:148-162 [Conf]
  28. Ehud Gudes, Alexander Pertsev
    Mining Module for Adaptive XML Path Indexing. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:1015-1019 [Conf]
  29. Martin S. Olivier, Reind P. van de Riet, Ehud Gudes
    Specifying Application-Level Security in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:346-351 [Conf]
  30. Amir Sapir, Ehud Gudes
    Dynamic Relationships and their Propagation Attributes in Object Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:967-974 [Conf]
  31. Moti Cohen, Ehud Gudes
    Diagonally Subgraphs Pattern Mining. [Citation Graph (0, 0)][DBLP]
    DMKD, 2004, pp:51-58 [Conf]
  32. Ehud Gudes, Carmel Domshlak, Natalia Orlov
    Remote Conferencing with Multimedia Objects. [Citation Graph (0, 0)][DBLP]
    EDBT Workshops, 2002, pp:526-543 [Conf]
  33. Ehud Reches, Ehud Gudes, Ehud Y. Shapiro
    A Distributed Locking Algorithm for A Transactions System in Flat Concurrent Prolog. [Citation Graph (0, 0)][DBLP]
    FODO, 1989, pp:304-319 [Conf]
  34. Raghav Kaushik, Pradeep Shenoy, Philip Bohannon, Ehud Gudes
    Exploiting Local Similarity for Indexing Paths in Graph-Structured Data. [Citation Graph (0, 0)][DBLP]
    ICDE, 2002, pp:129-140 [Conf]
  35. Natalia Vanetik, Ehud Gudes
    Mining Frequent Labeled and Partially Labeled Graph Patterns. [Citation Graph (0, 0)][DBLP]
    ICDE, 2004, pp:91-102 [Conf]
  36. Natalia Vanetik, Ehud Gudes, Solomon Eyal Shimony
    Computing Frequent Graph Patterns from Semistructured Data. [Citation Graph (0, 0)][DBLP]
    ICDM, 2002, pp:458-465 [Conf]
  37. Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels
    A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:171-186 [Conf]
  38. Alex Gurevich, Ehud Gudes
    Recent Research on Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:377-380 [Conf]
  39. Alex Gurevich, Ehud Gudes
    Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2006, pp:121-128 [Conf]
  40. Ehud Gudes, Tsvi Kuflik, Amnon Meisels
    An Expert Systems Based Methodology for Solving Resource Allocation Problems. [Citation Graph (0, 0)][DBLP]
    IEA/AIE (Vol. 1), 1990, pp:309-317 [Conf]
  41. Johann P. Malmquist, Ehud Gudes, Edward L. Robertson
    Storage Allocation for Access Path Minimization in Network Structured Data Bases. [Citation Graph (0, 0)][DBLP]
    JCDKB, 1978, pp:319-0 [Conf]
  42. Alexander Binun, Ehud Gudes
    Policy and State Based Secure Wrapper and Its Application to Mobile Agents. [Citation Graph (0, 0)][DBLP]
    LA-WEB, 2003, pp:14-26 [Conf]
  43. Mira Balaban, Nikolai Berezansky, Ehud Gudes
    Answering Cooperative Recursive Queries in Web Federated Databases. [Citation Graph (0, 0)][DBLP]
    NGITS, 2002, pp:14-28 [Conf]
  44. G. Trzewik, Ehud Gudes, Amnon Meisels, Gadi Solotorevsky
    TRAPS - A Time Dependent Resource Allocation Language. [Citation Graph (0, 0)][DBLP]
    NGITS, 1995, pp:0-0 [Conf]
  45. Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes
    A Method-Based Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:135-150 [Conf]
  46. Amnon Meisels, Ehud Gudes, Gadi Solotorevsky
    Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach. [Citation Graph (0, 0)][DBLP]
    PATAT, 1995, pp:93-105 [Conf]
  47. Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
    A Structure Preserving Database Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:28-40 [Conf]
  48. Masha Gendler-Fishman, Ehud Gudes
    A compile-time model for safe information flow in object-oriented databases. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:41-55 [Conf]
  49. Lev-Arie Ratinov, Solomon Eyal Shimony, Ehud Gudes
    Probabilistic model for schema understanding and matching. [Citation Graph (0, 0)][DBLP]
    SMC (5), 2004, pp:4768-4773 [Conf]
  50. Lev-Arie Ratinov, Ehud Gudes
    Abbreviation Expansion in Schema Matching and Web Integration. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:485-489 [Conf]
  51. Paz Biber, Ehud Gudes
    Using Relevant Sets for Optimizing XML Indexes. [Citation Graph (0, 0)][DBLP]
    WEBIST, 2005, pp:13-23 [Conf]
  52. Rachel Ben-Eliyahu-Zohary, Ehud Gudes, Giovambattista Ianni
    Metaqueries: Semantics, complexity, and efficient algorithms. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2003, v:149, n:1, pp:61-87 [Journal]
  53. Rachel Ben-Eliyahu-Zohary, Carmel Domshlak, Ehud Gudes, N. Liusternik, Amnon Meisels, Tzachi Rosen, Solomon Eyal Shimony
    FlexiMine - A Flexible Platform for KDD Research and Application Development. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2003, v:39, n:1-2, pp:175-204 [Journal]
  54. Ehud Gudes, Anthony Hoffman
    A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System". [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1979, v:22, n:10, pp:550-553 [Journal]
  55. Amnon Meisels, Jihad El-Sana, Ehud Gudes
    Decomposing and Solving Timetabling Constraint Networks. [Citation Graph (0, 0)][DBLP]
    Computational Intelligence, 1997, v:13, n:4, pp:486-505 [Journal]
  56. Ehud Gudes, Harvey S. Koch, F. A. Stahl
    Security in a Multi-Level Structured Model of a Data Base. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1979, v:22, n:4, pp:303-306 [Journal]
  57. Natalia Vanetik, Solomon Eyal Shimony, Ehud Gudes
    Support measures for graph data. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2006, v:13, n:2, pp:243-260 [Journal]
  58. Ehud Gudes, Aharon Tubman
    AutoWF - A secure Web workflow system using autonomous objects. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:1, pp:1-27 [Journal]
  59. Martin S. Olivier, Ehud Gudes
    Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:3, pp:281-292 [Journal]
  60. Reind P. van de Riet, Andrea Junk, Ehud Gudes
    Security in Cyberspace: A Knowledge-Base Approach. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1997, v:24, n:1, pp:69-96 [Journal]
  61. Boris Rozenberg, Ehud Gudes
    Association rules mining in vertically partitioned databases. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2006, v:59, n:2, pp:378-396 [Journal]
  62. Prabuddha De, Arun Sen, Ehud Gudes
    A new model for data base abstraction. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1982, v:7, n:1, pp:1-12 [Journal]
  63. Ehud Gudes
    A Uniform Indexing Scheme for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1997, v:22, n:4, pp:199-221 [Journal]
  64. Ehud Gudes, Martin S. Olivier, Reind P. van de Riet
    Modeling, Specifying and Implementing Workflow Security in Cyberspace. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal]
  65. Amnon Meisels, Tsvi Kuflik, Ehud Gudes
    Limited-resource scheduling by generalized rule-based system. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 1991, v:4, n:4, pp:215-224 [Journal]
  66. Ehud Gudes
    Teaching data base systems using Date and Computing Surveys. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1977, v:9, n:1, pp:47-49 [Journal]
  67. Ehud Gudes, Gilad Bracha
    GCI-A Tool for Developing Interactive CAD User Interfaces. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1987, v:17, n:11, pp:783-799 [Journal]
  68. Ehud Gudes, Solomon Eyal Shimony, Natalia Vanetik
    Discovering Frequent Graph Patterns Using Disjoint Paths. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2006, v:18, n:11, pp:1441-1456 [Journal]
  69. Gadi Solotorevsky, Ehud Gudes, Amnon Meisels
    RAPS: A Rule-Based Language for Specifying Resource Allocation and Time-Tabling. [Citation Graph (0, 16)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1994, v:6, n:5, pp:681-697 [Journal]
  70. Natalija Krivokapic, Alfons Kemper, Ehud Gudes
    Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis. [Citation Graph (0, 39)][DBLP]
    VLDB J., 1999, v:8, n:2, pp:79-100 [Journal]
  71. Luis Vargas, Lauri I. W. Pesonen, Ehud Gudes, Jean Bacon
    Transactions in Content-Based Publish/Subscribe Middleware. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2007, pp:68- [Conf]
  72. Alex Roichman, Ehud Gudes
    Fine-grained access control to web databases. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:31-40 [Conf]

  73. The application of cryptography for data base security. [Citation Graph (, )][DBLP]


  74. CAMLS: A Constraint-Based Apriori Algorithm for Mining Long Sequences. [Citation Graph (, )][DBLP]


  75. Methods for Computing Trust and Reputation While Preserving Privacy. [Citation Graph (, )][DBLP]


  76. DIWeDa - Detecting Intrusions in Web Databases. [Citation Graph (, )][DBLP]


  77. TOPS: a new design for transactions in publish/subscribe middleware. [Citation Graph (, )][DBLP]


  78. SISR - A New Model for Epidemic Spreading of Electronic Threats. [Citation Graph (, )][DBLP]


  79. Method for Detecting Unknown Malicious Executables. [Citation Graph (, )][DBLP]


  80. CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities. [Citation Graph (, )][DBLP]


  81. A Distributed Framework for the Detection of New Worm-Related Malware. [Citation Graph (, )][DBLP]


  82. Subsea: an efficient heuristic algorithm for subgraph isomorphism. [Citation Graph (, )][DBLP]


Search in 0.024secs, Finished in 0.030secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002