Search the dblp DataBase
Ehud Gudes :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Eduardo B. Fernández , Ehud Gudes , Haiyan Song A Model for Evaluation and Administration of Security in Object-Oriented Databases. [Citation Graph (7, 20)][DBLP ] IEEE Trans. Knowl. Data Eng., 1994, v:6, n:2, pp:275-292 [Journal ] Ehud Gudes , Haiyan Song , Eduardo B. Fernández Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP ] DBSec, 1990, pp:85-98 [Conf ] María M. Larrondo-Petrie , Ehud Gudes , Haiyan Song , Eduardo B. Fernández Security Policies in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP ] DBSec, 1989, pp:257-268 [Conf ] Nurith Gal-Oz , Ehud Gudes , Eduardo B. Fernández A Model of Methods Access Authorization in Object-oriented Databases. [Citation Graph (2, 9)][DBLP ] VLDB, 1993, pp:52-61 [Conf ] Peretz Shoval , Ehud Gudes , Moshe Goldstein GISD: a graphical interactive system for conceptual database design. [Citation Graph (2, 0)][DBLP ] Inf. Syst., 1988, v:13, n:1, pp:81-95 [Journal ] David L. Spooner , Ehud Gudes A Unifying Approach to the Design of a Secure Database Operating System. [Citation Graph (2, 0)][DBLP ] IEEE Trans. Software Eng., 1984, v:10, n:3, pp:310-319 [Journal ] Prabuddha De , Arun Sen , Ehud Gudes An Extended Entity-Relationship Model with Multi Level External Views. [Citation Graph (1, 12)][DBLP ] ER, 1981, pp:455-472 [Conf ] Ehud Gudes A Uniform Indexing Scheme for Object-Oriented Databases. [Citation Graph (1, 6)][DBLP ] ICDE, 1996, pp:238-246 [Conf ] Rachel Ben-Eliyahu-Zohary , Ehud Gudes Towards Efficient Metaquerying. [Citation Graph (1, 0)][DBLP ] IJCAI, 1999, pp:800-805 [Conf ] Carmel Domshlak , D. Gershkovich , Ehud Gudes , N. Liusternik , Amnon Meisels , Tzachi Rosen , Solomon Eyal Shimony FlexiMine - A Flexible Platform for KDD Research and Application Construction. [Citation Graph (1, 0)][DBLP ] KDD, 1998, pp:184-188 [Conf ] Amir Sapir , Ehud Gudes Dynamic Relationships and Their Propagation and Concurrency Semantics in Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] NGITS, 1999, pp:94-111 [Conf ] Ehud Gudes , Shalom Tsur Experiments with B-Tree Reorganization. [Citation Graph (1, 5)][DBLP ] SIGMOD Conference, 1980, pp:200-206 [Conf ] Eduardo B. Fernández , Ehud Gudes , Haiyan Song A Security Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:110-115 [Conf ] Ehud Gudes , A. Reiter On Evaluating Boolean Expressions. [Citation Graph (1, 0)][DBLP ] Softw., Pract. Exper., 1973, v:3, n:4, pp:345-350 [Journal ] Ehud Gudes The Design of a Cryptopgraphy Based Secure File System. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1980, v:6, n:5, pp:411-420 [Journal ] Gadi Solotorevsky , Ehud Gudes Algorithms for Solving Distributed Constraint Satisfaction Problems (DCSPs). [Citation Graph (0, 0)][DBLP ] AIPS, 1996, pp:191-198 [Conf ] Gadi Solotorevsky , Ehud Gudes , Amnon Meisels Modeling and Solving Distributed Constraint Satisfaction Problems (DCSPs). [Citation Graph (0, 0)][DBLP ] CP, 1996, pp:561-562 [Conf ] Rachel Ben-Eliyahu-Zohary , Ehud Gudes Meta-queries - Computation and Evaluation. [Citation Graph (0, 0)][DBLP ] DaWaK, 2000, pp:265-275 [Conf ] Masha Gendler-Fishman , Ehud Gudes Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:110-133 [Conf ] Ehud Gudes , Luigi V. Mancini , Francesco Parisi-Presicce Information Flow Analysis for File Systems and Databases Using Labels. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:125-141 [Conf ] Ehud Gudes , Martin S. Olivier Security Policies in Replicated and Autonomous Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:93-107 [Conf ] Ehud Gudes , Boris Rozenberg Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:91-104 [Conf ] Ehud Gudes , Reind P. van de Riet , J. F. M. Burg , Martin S. Olivier Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:182-195 [Conf ] Martin S. Olivier , Ehud Gudes Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:149-160 [Conf ] Reind P. van de Riet , Ehud Gudes An Object-Oriented Database Architecture for Providing Securty in Cyberspace. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:120-144 [Conf ] Erez Shmueli , Ronen Waisenberg , Yuval Elovici , Ehud Gudes Designing Secure Indexes for Encrypted Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:54-68 [Conf ] Noa Tuval , Ehud Gudes Resolving Information Flow Conflicts in RBAC Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:148-162 [Conf ] Ehud Gudes , Alexander Pertsev Mining Module for Adaptive XML Path Indexing. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2005, pp:1015-1019 [Conf ] Martin S. Olivier , Reind P. van de Riet , Ehud Gudes Specifying Application-Level Security in Workflow Systems. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:346-351 [Conf ] Amir Sapir , Ehud Gudes Dynamic Relationships and their Propagation Attributes in Object Oriented Databases. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:967-974 [Conf ] Moti Cohen , Ehud Gudes Diagonally Subgraphs Pattern Mining. [Citation Graph (0, 0)][DBLP ] DMKD, 2004, pp:51-58 [Conf ] Ehud Gudes , Carmel Domshlak , Natalia Orlov Remote Conferencing with Multimedia Objects. [Citation Graph (0, 0)][DBLP ] EDBT Workshops, 2002, pp:526-543 [Conf ] Ehud Reches , Ehud Gudes , Ehud Y. Shapiro A Distributed Locking Algorithm for A Transactions System in Flat Concurrent Prolog. [Citation Graph (0, 0)][DBLP ] FODO, 1989, pp:304-319 [Conf ] Raghav Kaushik , Pradeep Shenoy , Philip Bohannon , Ehud Gudes Exploiting Local Similarity for Indexing Paths in Graph-Structured Data. [Citation Graph (0, 0)][DBLP ] ICDE, 2002, pp:129-140 [Conf ] Natalia Vanetik , Ehud Gudes Mining Frequent Labeled and Partially Labeled Graph Patterns. [Citation Graph (0, 0)][DBLP ] ICDE, 2004, pp:91-102 [Conf ] Natalia Vanetik , Ehud Gudes , Solomon Eyal Shimony Computing Frequent Graph Patterns from Semistructured Data. [Citation Graph (0, 0)][DBLP ] ICDM, 2002, pp:458-465 [Conf ] Ilanit Moodahi , Ehud Gudes , Oz Lavee , Amnon Meisels A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:171-186 [Conf ] Alex Gurevich , Ehud Gudes Recent Research on Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP ] ICISS, 2006, pp:377-380 [Conf ] Alex Gurevich , Ehud Gudes Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. [Citation Graph (0, 0)][DBLP ] IDEAS, 2006, pp:121-128 [Conf ] Ehud Gudes , Tsvi Kuflik , Amnon Meisels An Expert Systems Based Methodology for Solving Resource Allocation Problems. [Citation Graph (0, 0)][DBLP ] IEA/AIE (Vol. 1), 1990, pp:309-317 [Conf ] Johann P. Malmquist , Ehud Gudes , Edward L. Robertson Storage Allocation for Access Path Minimization in Network Structured Data Bases. [Citation Graph (0, 0)][DBLP ] JCDKB, 1978, pp:319-0 [Conf ] Alexander Binun , Ehud Gudes Policy and State Based Secure Wrapper and Its Application to Mobile Agents. [Citation Graph (0, 0)][DBLP ] LA-WEB, 2003, pp:14-26 [Conf ] Mira Balaban , Nikolai Berezansky , Ehud Gudes Answering Cooperative Recursive Queries in Web Federated Databases. [Citation Graph (0, 0)][DBLP ] NGITS, 2002, pp:14-28 [Conf ] G. Trzewik , Ehud Gudes , Amnon Meisels , Gadi Solotorevsky TRAPS - A Time Dependent Resource Allocation Language. [Citation Graph (0, 0)][DBLP ] NGITS, 1995, pp:0-0 [Conf ] Eduardo B. Fernández , María M. Larrondo-Petrie , Ehud Gudes A Method-Based Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:135-150 [Conf ] Amnon Meisels , Ehud Gudes , Gadi Solotorevsky Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach. [Citation Graph (0, 0)][DBLP ] PATAT, 1995, pp:93-105 [Conf ] Yuval Elovici , Ronen Waisenberg , Erez Shmueli , Ehud Gudes A Structure Preserving Database Encryption Scheme. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2004, pp:28-40 [Conf ] Masha Gendler-Fishman , Ehud Gudes A compile-time model for safe information flow in object-oriented databases. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:41-55 [Conf ] Lev-Arie Ratinov , Solomon Eyal Shimony , Ehud Gudes Probabilistic model for schema understanding and matching. [Citation Graph (0, 0)][DBLP ] SMC (5), 2004, pp:4768-4773 [Conf ] Lev-Arie Ratinov , Ehud Gudes Abbreviation Expansion in Schema Matching and Web Integration. [Citation Graph (0, 0)][DBLP ] Web Intelligence, 2004, pp:485-489 [Conf ] Paz Biber , Ehud Gudes Using Relevant Sets for Optimizing XML Indexes. [Citation Graph (0, 0)][DBLP ] WEBIST, 2005, pp:13-23 [Conf ] Rachel Ben-Eliyahu-Zohary , Ehud Gudes , Giovambattista Ianni Metaqueries: Semantics, complexity, and efficient algorithms. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 2003, v:149, n:1, pp:61-87 [Journal ] Rachel Ben-Eliyahu-Zohary , Carmel Domshlak , Ehud Gudes , N. Liusternik , Amnon Meisels , Tzachi Rosen , Solomon Eyal Shimony FlexiMine - A Flexible Platform for KDD Research and Application Development. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2003, v:39, n:1-2, pp:175-204 [Journal ] Ehud Gudes , Anthony Hoffman A Note on: "An Optimal Evaluation of Boolean Expressions in an Online Query System". [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1979, v:22, n:10, pp:550-553 [Journal ] Amnon Meisels , Jihad El-Sana , Ehud Gudes Decomposing and Solving Timetabling Constraint Networks. [Citation Graph (0, 0)][DBLP ] Computational Intelligence, 1997, v:13, n:4, pp:486-505 [Journal ] Ehud Gudes , Harvey S. Koch , F. A. Stahl Security in a Multi-Level Structured Model of a Data Base. [Citation Graph (0, 0)][DBLP ] Comput. J., 1979, v:22, n:4, pp:303-306 [Journal ] Natalia Vanetik , Solomon Eyal Shimony , Ehud Gudes Support measures for graph data. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 2006, v:13, n:2, pp:243-260 [Journal ] Ehud Gudes , Aharon Tubman AutoWF - A secure Web workflow system using autonomous objects. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:43, n:1, pp:1-27 [Journal ] Martin S. Olivier , Ehud Gudes Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:43, n:3, pp:281-292 [Journal ] Reind P. van de Riet , Andrea Junk , Ehud Gudes Security in Cyberspace: A Knowledge-Base Approach. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1997, v:24, n:1, pp:69-96 [Journal ] Boris Rozenberg , Ehud Gudes Association rules mining in vertically partitioned databases. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2006, v:59, n:2, pp:378-396 [Journal ] Prabuddha De , Arun Sen , Ehud Gudes A new model for data base abstraction. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1982, v:7, n:1, pp:1-12 [Journal ] Ehud Gudes A Uniform Indexing Scheme for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1997, v:22, n:4, pp:199-221 [Journal ] Ehud Gudes , Martin S. Olivier , Reind P. van de Riet Modeling, Specifying and Implementing Workflow Security in Cyberspace. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal ] Amnon Meisels , Tsvi Kuflik , Ehud Gudes Limited-resource scheduling by generalized rule-based system. [Citation Graph (0, 0)][DBLP ] Knowl.-Based Syst., 1991, v:4, n:4, pp:215-224 [Journal ] Ehud Gudes Teaching data base systems using Date and Computing Surveys. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1977, v:9, n:1, pp:47-49 [Journal ] Ehud Gudes , Gilad Bracha GCI-A Tool for Developing Interactive CAD User Interfaces. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1987, v:17, n:11, pp:783-799 [Journal ] Ehud Gudes , Solomon Eyal Shimony , Natalia Vanetik Discovering Frequent Graph Patterns Using Disjoint Paths. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2006, v:18, n:11, pp:1441-1456 [Journal ] Gadi Solotorevsky , Ehud Gudes , Amnon Meisels RAPS: A Rule-Based Language for Specifying Resource Allocation and Time-Tabling. [Citation Graph (0, 16)][DBLP ] IEEE Trans. Knowl. Data Eng., 1994, v:6, n:5, pp:681-697 [Journal ] Natalija Krivokapic , Alfons Kemper , Ehud Gudes Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis. [Citation Graph (0, 39)][DBLP ] VLDB J., 1999, v:8, n:2, pp:79-100 [Journal ] Luis Vargas , Lauri I. W. Pesonen , Ehud Gudes , Jean Bacon Transactions in Content-Based Publish/Subscribe Middleware. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2007, pp:68- [Conf ] Alex Roichman , Ehud Gudes Fine-grained access control to web databases. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:31-40 [Conf ] The application of cryptography for data base security. [Citation Graph (, )][DBLP ] CAMLS: A Constraint-Based Apriori Algorithm for Mining Long Sequences. [Citation Graph (, )][DBLP ] Methods for Computing Trust and Reputation While Preserving Privacy. [Citation Graph (, )][DBLP ] DIWeDa - Detecting Intrusions in Web Databases. [Citation Graph (, )][DBLP ] TOPS: a new design for transactions in publish/subscribe middleware. [Citation Graph (, )][DBLP ] SISR - A New Model for Epidemic Spreading of Electronic Threats. [Citation Graph (, )][DBLP ] Method for Detecting Unknown Malicious Executables. [Citation Graph (, )][DBLP ] CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities. [Citation Graph (, )][DBLP ] A Distributed Framework for the Detection of New Worm-Related Malware. [Citation Graph (, )][DBLP ] Subsea: an efficient heuristic algorithm for subgraph isomorphism. [Citation Graph (, )][DBLP ] Search in 0.024secs, Finished in 0.030secs